Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Teramind vs. InterGuard | 2021 Feature Comparison

Teramind and InterGuard, both are highly regarded as powerful employee monitoring platforms for the modern workforce. Both of them have strong activity monitoring, productivity analysis and reporting features. Especially, after the recent refresh of its UI, InterGuard has been able to up its game in user friendliness – a big factor for this kind of software. On the other hand, Teramind is already known for its intuitive, award-winning interface.

Weekly Cyber Security News 12/02/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Three quite interesting articles this week. The first is unsettling, if it wasn’t for someone spotting it in progress and was able to counteract the activity, who knows what might have happened. The question is then, who did it?

Employee Productivity Solution For Remote Workers

Remote work gives employees the opportunity to avoid lengthy commutes and work more flexible schedules. It also allows employers to reduce overhead costs and hire from a larger pool of applicants since employees no longer need to live locally to qualify. But of course, there are some downsides to remote work as well. There are far more distractions at home, so many remote workers find it difficult to stay focused during work hours.

The Kubernetes API Server: Exploring its security impact and how to lock it down

Organizations are increasingly turning to Kubernetes to manage their containers. As reported by Container Journal, 48% of respondents to a 2020 survey said that their organizations were using the platform. That’s up from 27% two years prior. These organizations could be turning to Kubernetes for the many benefits it affords them.

Three Open Source Software Security Myths Dispelled

Used by developers around the world, open source components comprise 60%-80% (and likely more) of the codebase in modern applications. Open source components speed the development of proprietary applications, save money, and help organizations stay on the cutting edge of technology development. Despite the widespread adoption of open source components, myths persist about its usage. The following are the top three concerns associated with open source use.

Hairpinning: The Dirty Little Secret of Most Cloud Security Vendors

In more than one conversation with large enterprise clients, we’ve heard the networking and infrastructure leaders responsible for managing the organization’s global WAN jokingly refer to themselves as the “Chief Hairpinning Officer” or CHO. At first blush, this provides a laugh.