Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Cloud and Threat Report: Shadow IT in the Cloud

The number of cloud apps being used in the enterprise increased by 20% in 2020, when the COVID-19 pandemic caused a sudden and dramatic shift to remote work for knowledge workers worldwide. Individuals, teams, and organizations all turned to cloud apps to help address some of the new challenges of remote work. The increase in the number of cloud apps was led by an increase in consumer and collaboration apps, the fasting spreading of which included Discord, Zoom, Lumin PDF, and…Xbox LIVE?

How Network Engineers are Reclaiming Their Time

Speak with networking ops and engineering leads anywhere, and you’ll hear what I frequently hear: “The way my team actually spends their time is the opposite of how they feel they could best spend it.” The passion they have for their team and the network they keep running is clearly at odds with a frustrating feeling that they can’t get ahead.

Dangers of Only Scanning First-Party Code

When it comes to securing your applications, it’s not unusual to only consider the risks from your first-party code. But if you’re solely considering your own code, then your attack surface is likely bigger than you think. Our recent State of Software Security report found that 97 percent of the typical Java application is made up of open source libraries. That means your attack surface is exponentially larger than just the code written in-house.

Top Three Threats Facing US Government Employees Amid Telework

We’re all familiar with what happened in 2020. Amid the coronavirus pandemic, organizations worldwide were forced to send their workforces home. Along with the private sector, federal, state and local government agencies and departments across the United States implemented telework programs. Now that we’ve been living with telework for a year now, I wanted to understand how it has affected the government sector.

10 Database Security Best Practices You Should Know

According to Risk Based Security’s 2020 Q3 report, around 36 billion records were compromised between January and September 2020. While this result is quite staggering, it also sends a clear message of the need for effective database security measures. Database security measures are a bit different from website security practices. The former involve physical steps, software solutions and even educating your employees.

Observability is transforming ITOM landscape as next generation monitoring

First things first. Observability is inherent as a principle to a system and not something that is instilled. Here, we are addressing observability as an open source based solution in the context of insightful monitoring within the ITOM landscape. ITOM is now in the middle of addressing the needs of the expanding and dynamic nature of IT infrastructure as a function. It is no longer about being a monolithic computing stack. It is now beyond monitoring discrete infrastructure elements.

Public vs Private Cloud Security: A Simple Explanation

(Guest Post) There is no worse feeling than the heartache you get after recording your child’s milestones, only for the mobile phone to start warning that the internal storage is running low. Or maybe you cannot function without music, and you have been downloading so many songs that both your internal storage and memory card are full. Most people would rush to delete some of the songs, but you should not have to decide between two of your favourite artists because you are not one of them.

A Guide to VPN Security

Many people are familiar with VPNs in the context of trying to stream TV shows for free. A VPN can make it seem like you’re in a different country by displaying an IP address in Europe or the US, for instance. Appearing to be in New York while traveling in the Netherlands gives you access to sites like Netflix, Hulu, and HBO Max — but the advantages of VPN security go beyond streaming the latest TV shows.