January 2021 - TuxCare

How to Negotiate the Purchase of a New IT Tool – 5 Steps to Success

How to Negotiate the Purchase of a New IT Tool - 5 Steps to Success

 

The new year is finally upon us and with that comes the task of taking a careful examination of our IT practices over the previous years, establishing the areas that require improvement, and formulating a plan to tackle any unresolved issues via the purchase or acquisition of new IT tools. 2020 was a year unlike any other and nearly all industries were faced with considerable challenges that called for rapid adaptation, and the IT field was no exception.

Continue reading “How to Negotiate the Purchase of a New IT Tool – 5 Steps to Success”

Remote code execution attack: what it is, how to protect your systems

Remote code execution attack: what it is and how to protect your systemsCybercriminals use a range of strategies to target vulnerable systems – and remote code execution (RCE) attacks are one of the most common strategies. Indeed, according to the 2020 Global Threat Intelligence Report from NTT, RCE attacks were the most common attack technique observed – followed by injection attacks.

Continue reading “Remote code execution attack: what it is, how to protect your systems”

The Best Practices for Cyber-resiliency in an Enterprise World

The Best Practices for Cyber-resiliency in an Enterprise WorldIn the face of adversity, your enterprise’s ability to continue with business, even in a degraded mode, heavily depends on the resiliency of its cyber systems. 

Continue reading “The Best Practices for Cyber-resiliency in an Enterprise World”

Presenting New Design Of The KernelCare Blog

Presenting New Design Of The KernelCare BlogNew Look, Better KernelCare

You may have noticed that things look a little different around the KernelCare blog recently. And you’d be absolutely right! We’ve spent some time examining how we can better serve you and our KernelCare community and the resulting outcome was a completely redesigned and reimagined blog. Our new design aims to give you more of what you really want, up to date industry and product related news at your fingertips as well as a platform to voice your valuable insights and opinions. 

Continue reading “Presenting New Design Of The KernelCare Blog”

Increasing Security of MySQL Databases While Eliminating Downtime

imgonline-com-ua-CompressToSize-Zxilu4i2PmBOpen-source software (OSS) has quickly transformed how modern applications are built and their underlying code. Access to high-quality and robust open-source software projects has allowed developers to quickly integrate new capabilities into their applications without reinventing the wheel. As a result, it is now estimated that between 80% and 90% of the code in most modern applications is made up of open source components. Likewise, many of the tools that have enabled DevOps and CI/CD growth such as Jenkins, Kubernetes, and Docker are themselves open-source projects.

Continue reading “Increasing Security of MySQL Databases While Eliminating Downtime”

The Hidden Costs of a Data Breach That Could Last Years

The Hidden Costs of a Data Breach That Could Last YearsSoftware bugs and vulnerabilities often lead the way to massive security breaches via exploitation. These breaches spawn heavy costs to the organization in well-known monetary fees and penalties, but there are several unforeseen costs that affect the organization internally and publicly.

Continue reading “The Hidden Costs of a Data Breach That Could Last Years”

Take Part In The KernelCare Survey To Win A CKA Certification

KernelCare surveyParticipate in the KernelCare Survey to share your thoughts on the state of Enterprise vulnerability detection and patch management operations in your organization for a chance to win one of five Certified Kubernetes Administrator (CKA) Certifications from the Cloud Native Computing Foundation.

Continue reading “Take Part In The KernelCare Survey To Win A CKA Certification”

How KernelCare Helps You To Keep Your Containerized Workloads Secure

How KernelCare Helps You To Keep Your Containerized Workloads SecureOS virtualization was a huge step forward for the delivery of large-scale enterprise computing applications. But virtual machines were just the start. Containers take virtualization a step further, delivering unprecedented flexibility as applications become almost seamlessly transportable.

However, containers come with a hidden security risk that derives from the nature of containerization. In this article, we discuss the role of containerization in the enterprise, explain why contains can be an enterprise security risk – and point to effective solutions.

Continue reading “How KernelCare Helps You To Keep Your Containerized Workloads Secure”

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching