News & Information


11/30/2022   InfoWorld Security
AWS announces new cybersecurity features in Amazon Inspector and Amazon Macie at AWS Re:Invent 2022 in Las Vegas.
11/30/2022   Sophos Security
It's not just the hashing, by the way. It's the salting and the stretching, too!
11/29/2022   Sophos Security
An injury to one is an injury to all. Especially if the other people are part of your social network.
11/28/2022   Sophos Security
There isn't a rhyme to remind you which months have browser zero-days... you just have to keep your eyes and ears open!
11/28/2022   InfoWorld Security
The release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to allow secure collaboration across messaging, voice, video and file sharing.
11/25/2022   Sophos Security
Those numbers or names that pop up when a call comes up? They're OK as a hint of who's calling, but THEY PROVE NOTHING
11/24/2022   Sophos Security
Latest episode - security expert John Shier explains what the real-life cybercrime stories in the Sophos Threat Report can teach us
11/23/2022   Sophos Security
Five tips to keep yourself, and your friends and family, out of the clutches of "chopping block" scammers...
11/22/2022   Sophos Security
Review your servers, your patches and your authentication policies - there's a proof-of-concept out
11/21/2022   Sophos Security
The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
11/17/2022   Sophos Security
Don't let a keen eye for bargains lead you into risky online behaviour...
11/17/2022   Sophos Security
Latest episode - listen now! Cybersecurity news plus loads of great advice...
11/11/2022   InfoWorld Security

Observability is one of those concepts being tossed about these days in the tech press and at cloud computing conferences. Everyone has a definition of what it is and how it’s used. No two are the same.

Observability seems to be mostly defined as the ability to determine key insights from a great deal of data. Observability as related to cloud operations (cloudops) normally uses data that’s being extracted from running systems. We use this data not only to determine if something is going wrong, but to figure out why and how to fix it.

What’s the value of observability as a concept, and how is it of value to cloudops? Let’s break it down into components that allow enterprises to dissect observability into ways that return value back to the business:

To read this article in full, please click here

11/08/2022   InfoWorld Security

Automation is not new, but its use in cloud computing is recent. The idea is to automate tasks that have been traditionally carried out by humans; for example, self-healing a saturated compute server by automatically restarting it on a cloud provider. Or restricting the overuse of some expensive cloud service by finops automation, or having security automation defend against a cloud-borne breach attempt that happens at 3:00 a.m.

The truth is I’ve preached the role of automation in cloud computing for many years now, but I’ve noticed a reluctance to set up and leverage automation within cloud deployments. This seems to be a systemic problem that could lead to suboptimized cloud deployments, missing an opportunity to have more reliable, more secure, and more trackable cloud operations.

To read this article in full, please click here

11/04/2022   InfoWorld Security
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.
11/02/2022   InfoWorld Security

Java services company Azul has unveiled Azul Vulnerability Detection, a SaaS product that leverages the Azul JVM to continuously monitor Java applications for security vulnerabilities.

Azul Vulnerability Detection, introduced November 2, is an agentless cloud service designed for production use. It addresses enterprise risk around software supply chain attacks and eliminates false positives while not impacting performance, Azul said.

Accessible from, Azul Vulnerability Detection identifies code running in the Azul JVM and maps it against a curated Java-specific database of common vulnerabilities and exposures (CVEs). A history of detections is retained so when new CVEs are disclosed, users can determine when and on what systems they have been running vulnerable software.

To read this article in full, please click here