Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Feature Friday #9: body file control - inputs

Did you know you can include one policy file from another? Traditionally you specify the files you want to make up a policy set using inputs in body common control found in your policy entry (promises.cf by default). body file control lets you specify additional inputs from any file that’s included in the policy and those files can include other files. Let’s check out a contrived example.

Demystifying Blockchain: Understanding Its Role in Securing Digital Transactions

Blockchain technology, first introduced as the underlying framework for Bitcoin, has emerged as a key innovator in digital security and transactional integrity. This article explores blockchain's fundamental mechanics, its role in enhancing digital trust, its diverse applications, and its future prospects.

Leveraging Proxies for Scalable Cloud Operations

The cloud has become a fundamentally impactful feature of the business IT ecosystem, and it's the scalability that's innate to this tech which means it can accommodate the needs of all sorts of organizations - from startups with limited budgets to multinationals with few limits on their spending.

Strengthen Your Security in the Cloud: Privacy and Data Security

Managing security in the cloud and throughout hybrid environments is a challenge with high stakes — customer data, sensitive information, access privileges, and other cloud-based assets are all at risk when an organization uses the cloud. Let’s explore some common cloud-based security concerns and learn how to keep your cloud environment secure.

Top Vulnerabilities and the Power of Patch Management

The cybersecurity landscape in 2023 was increasingly complex, marked by sophisticated types of cyber threats such as ransomware and cyber espionage. Over half of the high-risk vulnerabilities were exploited by threat actors, with ransomware payouts averaging a significant $1,542,333, up from $812,380 in 2022. Phishing attacks dominated, accounting for over 80% of incidents, and 57% of organizations experienced frequent phishing attempts. Additionally, 4,000 ransomware attacks occurred daily since 2016.

ISO 27001: 8 Steps to Implement The Security Standard

ISO 27001 is the globally recognized standard for Information Security Management. It uses a Risk Management approach to provide a framework for managing, controlling, and protecting privileged and sensitive information. The standard sets out the requirements for establishing, maintaining, implementing, and continually improving an organization's Information Security Management System (ISMS).

Go fixes its 7th code execution bug in the same feature

If there’s one Go programming language feature that just doesn’t seem to catch a break when it comes to security, it’s the CFLAGS and LDFLAGS handling in cgo. This is a feature that lets parts of Go source code control the compiler and linker flags that are used to build that same code.

Potential causes of a collaboration platform data breach

Data is the lifeblood of modern organizations. Since data helps teams make better decisions and provide a competitive edge, it’s also a target of bad actors looking to steal sensitive information or launch ransomware attacks. From software vulnerabilities and weak authentication mechanisms to malware and inadequate access controls, there’s no shortage of ways for hackers to infiltrate networks and gain access to mission-critical data.

Mastering Cybersecurity: Essential OWASP Guidelines for Effective Protection

Join Dwayne McDaniel as he discusses the challenges and essentials of effective cybersecurity, highlighting the impact of bad security practices, the benefits of robust security measures, and the importance of community collaboration. This talk explores practical insights on improving security protocols, leveraging community knowledge, and the significant role of automation in ensuring safe, uninterrupted digital environments.

What is Early Launch Anti Malware? An Overview

In an era dominated by digital advancements, cybersecurity has become the cornerstone of technological integrity and trust. The pivotal role of cybersecurity in today’s digital landscape is exemplified by the exponential rise in cyber threats—ranging from ransomware to sophisticated phishing attacks—that demand increasingly robust defensive mechanisms.