Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UpGuard

Vendor Risk: The Hidden Challenge of GDPR Compliance

The European Union’s GDPR regulations go into effect in May of this year. In essence, GDPR is a strict data privacy code that holds companies responsible for securing the data they store and process. Although GDPR was approved in April 2016, companies affected by the regulations are still struggling to reach compliance by the May 2018 deadline.

How UpGuard Monitors Linux Systems for Meltdown and Spectre

Meltdown and Spectre are critical vulnerabilities affecting a large swathe of processors: “effectively every [Intel] processor since 1995 (except Intel Itanium and Intel Atom before 2013),” as meltdownattack.com puts it. ARM and AMD processors are susceptible to portions of Meltdown, though much less at risk than the affected Intel hardware. Exploiting Meltdown allows attackers to access data from other programs, effectively allowing them to steal whatever data they want.

Securing GitHub Permissions with UpGuard

GitHub is a popular online code repository used by over 26 million people across the world for personal and enterprise uses. GitHub offers a way for people to collaborate on a distributed code base with powerful versioning, merging, and branching features. GitHub has become a common way to outsource the logistics of managing a code base repository so that teams can focus on the coding itself.

Check your Amazon S3 permissions. Someone will.

Nearly all large enterprises use the cloud to host servers, services, or data. Cloud hosted storage, like Amazon's S3, provides operational advantages over traditional computing that allow resources to be automatically distributed across robust and geographically varied servers. However, the cloud is part of the internet, and without proper care, the line separating the two disappears completely in cloud leaks— a major problem when it comes to sensitive information.

Patch Management for DevOps

According to Cisco's 2015 Annual Security Report, only four in ten IT departments have a coordinated patching strategy in place. The ramifications of this are evident in the rising frequency of enterprise data breaches year-on-year. You've certainly heard it before, but it's worth repeating again: unpatched and out-of-date systems are a leading cause of security incidents.

Network Administrator's Guide to DevOps

The transformation of physical networks and infrastructure into easier-to-manage virtualized/software components, hybridization of IT operations and software development roles, and the despecialization of job duties, among others, means that traditional networking roles- and arguably any IT roles with job titles ending with "admin"- will invariably disappear.

The Four Prerequisites for DevOps Success

The benefits of DevOps are more and more apparent every day. Faster recoveries, higher change success rate, better time to market - it's everything a CIO could want and more. But before you go all-in, you might want to take a minute to learn what makes DevOps initiatives succeed or fail. What are the basic steps you can take now to ensure that DevOps will succeed within your organization?