Jul 05, 2024The Hacker NewsCloud Security / Attack Surface The attack surface isn't what it once was and it's becoming a nightmare to protect. A constantly expanding and evolving attack surface means risk to the business has skyrocketed and current security measures are struggling to keep it protected. If you've clicked on this article, there's a good chance you're looking … [Read more...] about Blueprint for Success: Implementing a CTEM Operation
Implementing
Implementing Synthetic Monitoring with Telegraf and Logz.io
In my previous blog post, we explored key questions about Synthetic Monitoring, such as what it is, why it’s important, how it works, and how it compares to Real-User monitoring. Synthetic Monitoring is becoming an increasingly-popular method to continuously monitor the uptime of applications and the critical flows within them so that DevOps, IT, and engineering teams are … [Read more...] about Implementing Synthetic Monitoring with Telegraf and Logz.io
Implementing Zero Trust for the Workforce: Cisco’s Story
“It’s not often that you can say you are improving security while also improving the user experience, but that’s what we have achieved with this rollout.” – Josephina Fernandez, Director of Security Architecture & Research at Cisco The network edge has left the building. Long before 2020 happened, we were working from coffee shops, airports and client sites. We have been … [Read more...] about Implementing Zero Trust for the Workforce: Cisco’s Story