Subscribe to our Newsletter

What is Microsoft’s Azure Space, and who is it for?

Image: Microsoft. Azure Space uses the power of cloud and space technology to help businesses solve some of the world’s most challenging problems. Microsoft’s move into space shouldn’t be surprising; it’s had... Read more »

How to install Podman on Ubuntu

Jack Wallen walks you through the process of installing the container runtime Podman on Ubuntu Server 22.04. Image: Christian-P. Worring/Adobe Stock As you know, Kubernetes has officially deprecated Docker support, which means... Read more »

Cylance vs CrowdStrike: EDR software comparison

See what features you can expect from Cylance and CrowdStrike to choose the EDR solution that is ideal for your business. Image: joyfotoliakid/Adobe Stock The best endpoint detection and response tools can... Read more »

Kubernetes vs Docker: What are the main differences?

Image: Song_about_summer/Adobe Stock Containers and microservices have become the darling technology of enterprise businesses. This is especially true if your company has adopted CI/CD and DevOps solutions or is looking to become... Read more »

New Relic Expands Scope of Observability Reach

At its Futurestack conference, New Relic announced it expanded the integrations and tools it provides for its observability platform and added its first cybersecurity tool. The company now provides more than 470... Read more »

clickwrap agreement (clickthrough agreement)

A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a... Read more »

hypervisor security

Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle. This includes during development and in implementation. Common security practices for hypervisors... Read more »

3 best practices for cloud security monitoring

As powerful as the cloud may be, it’s not magic. If you have a problem before you transition to the cloud, it won’t… just go away once you make the switch. Cloud... Read more »

How to conduct proper AWS vulnerability scanning in 3 steps

AWS provides a set of security controls to protect its own infrastructure, but it’s important to be aware that… the security of the individual servers is the responsibility of the client —... Read more »

Understanding the CSA Cloud Controls Matrix and CSA CAIQ

The cloud has been — and continues to be — a challenge area for many security teams. It’s a continual struggle… to validate and onboard new providers, particularly given the rapid pace... Read more »