Tag: Safety

46_2

Cyber Security: Whose responsibility is it?

These are issues related to security and shared compliance between AWS and the customer. This shared model can ease the operational burden on the customer, as AWS operates, manages, and controls the components of the host operating system and virtualization layer right down to the physical security of the premises in which the services operate.

49_2

Performance Testing and Vulnerability Analysis: Keys to Security and Cost-Effectiveness

In this digital era accompanied by contingency scenarios, we know of several cases in which the privacy and confidentiality of organizations have been violated by cyber means. Which has obviously caused damage to his image, as well as time and money. Hence, it is essential to have quality assurance measures in the services that provide profitability to the business guaranteeing its continuity.

57_2

Microsoft releases urgent Windows update

Microsoft released software updates on June 30 to patch two high-risk security vulnerabilities affecting users of Windows 10 and Server editions. Both flaws likely reside in the Windows Codec Library.

69_2

Phishing

Phishing refers to sending emails that appear to come from trusted sources, but in reality aim to manipulate the recipient to steal sensitive information.

68_2

DevOps

They are a combination of cultural philosophies, practices, and tools that increase an organization’s ability to deliver applications and services at speed—developing and improving products faster than organizations that use traditional software development and infrastructure management processes. This speed allows organizations to better serve their customers and compete more effectively in the marketplace.

73_2

Security: AWS Identity

Manage access to workloads and applications securely.
For applications running on AWS, you can use specific access controls to grant employees, applications, and devices the access they need to resources.

74_2

New vulnerabilities in Ubuntu

A new vulnerability emerges in the Linux kernel in the versions Ubuntu 14.04 LTS, Ubuntu 15.04 Vivid Velvet, Trusty Tahr. In each of these versions, two flaws were detected, which were identified by the users themselves. These flaws have already been remedied, but it is necessary to update the version for the implementation of these fixes