The new year is finally upon us and with that comes the task of taking a careful examination of our IT practices over the previous years, establishing the areas that require improvement, and formulating a plan to tackle any unresolved issues via the purchase or acquisition of new IT tools. 2020 was a year unlike any other and nearly all industries were faced with considerable challenges that called for rapid adaptation, and the IT field was no exception.
Continue reading “How to Negotiate the Purchase of a New IT Tool – 5 Steps to Success”
Cybercriminals use a range of strategies to target vulnerable systems – and remote code execution (RCE) attacks are one of the most common strategies. Indeed, according to the 2020 Global Threat Intelligence Report from NTT, RCE attacks were the most common attack technique observed – followed by injection attacks.
Continue reading “Remote code execution attack: what it is, how to protect your systems”
In the face of adversity, your enterprise’s ability to continue with business, even in a degraded mode, heavily depends on the resiliency of its cyber systems.
Continue reading “The Best Practices for Cyber-resiliency in an Enterprise World”
New Look, Better KernelCare
You may have noticed that things look a little different around the KernelCare blog recently. And you’d be absolutely right! We’ve spent some time examining how we can better serve you and our KernelCare community and the resulting outcome was a completely redesigned and reimagined blog. Our new design aims to give you more of what you really want, up to date industry and product related news at your fingertips as well as a platform to voice your valuable insights and opinions.
Continue reading “Presenting New Design Of The KernelCare Blog”
Open-source software (OSS) has quickly transformed how modern applications are built and their underlying code. Access to high-quality and robust open-source software projects has allowed developers to quickly integrate new capabilities into their applications without reinventing the wheel. As a result, it is now estimated that between 80% and 90% of the code in most modern applications is made up of open source components. Likewise, many of the tools that have enabled DevOps and CI/CD growth such as Jenkins, Kubernetes, and Docker are themselves open-source projects.
Continue reading “Increasing Security of MySQL Databases While Eliminating Downtime”
Software bugs and vulnerabilities often lead the way to massive security breaches via exploitation. These breaches spawn heavy costs to the organization in well-known monetary fees and penalties, but there are several unforeseen costs that affect the organization internally and publicly.
Continue reading “The Hidden Costs of a Data Breach That Could Last Years”
Participate in the KernelCare Survey to share your thoughts on the state of Enterprise vulnerability detection and patch management operations in your organization for a chance to win one of five Certified Kubernetes Administrator (CKA) Certifications from the Cloud Native Computing Foundation.
Continue reading “Take Part In The KernelCare Survey To Win A CKA Certification”
Alma means “soul” in many Latin languages, including Spanish and Italian. The word comes from the Latin word almus, which means “nourishing, kind”.
Continue reading “AlmaLinux is born!!”
OS virtualization was a huge step forward for the delivery of large-scale enterprise computing applications. But virtual machines were just the start. Containers take virtualization a step further, delivering unprecedented flexibility as applications become almost seamlessly transportable.
However, containers come with a hidden security risk that derives from the nature of containerization. In this article, we discuss the role of containerization in the enterprise, explain why contains can be an enterprise security risk – and point to effective solutions.
Continue reading “How KernelCare Helps You To Keep Your Containerized Workloads Secure”