Acquia’s response to the Mautic Community Manifesto

On 16th August the Mautic Community shared their Manifesto, outlining three key areas where clarity was requested from Acquia. Commitment to keep Mautic Open Source and GPL, including all future versions Mautic remaining Open Source is a key differentiating factor in the market, and Acquia is committed that it will Continue Reading

CISOs Must Incorporate Employee Training When Developing Security Strategy

CISOs are facing a perfect storm when it comes to securing their networks. Cyber attacks are becoming increasingly sophisticated just as corporate networks are becoming more distributed and complex – all while security talent becomes harder to find and security strategy best practices evolve. In the midst of this turmoil, Continue Reading

Office 365 Vulnerabilities Every Business Should Consider

While many businesses are moving their email from on-premises to the cloud, many that have already made the switch have discovered that cloud hosted email has its share of drawbacks to go along with the benefits these businesses had originally sought. To help businesses make the right decision when choosing Continue Reading

CVE-2019-0708 – Remote Desktop Protocol and Remote Code Execution #Bluekeep

On May 14th, 2019, Microsoft released their usual set of updates, referred to within the industry as “Patch Tuesday.” At first glance, the inclusion of CVE-2019-0708 appeared to be similar to all the other updates released on that day—it included a writeup containing an overview of the update, including the Continue Reading

Bolstering Endpoint Security

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities. The organizational risks introduced several years ago by BYOD have been compounded Continue Reading

Infographic: Snapcraft for developers

At the end of last year, we shared an infographic highlighting the adoption of snaps by users for their desktop, server or IoT devices. Those snaps wouldn’t be available without the growing number of developers building them behind the scenes. But why have developers, including those from some of the Continue Reading

Understanding containerised workloads for Telco

For telecommunications companies evaluating ways to transition and modernise their network infrastructure, cloud-native, container-based microservices architectures are a powerful solution in meeting requirements of compute needs through edge cloud and beyond. Understanding infrastructure implications and design considerations for open source hardware and software development platforms, while remaining carrier grade and Continue Reading

Prevent Leaks of Sensitive Business Data with Security Gateway

Businesses of all types must maintain records containing personal information about their employees and customers, and executives and clients alike have a mutual interest in protecting that data. But there’s no guarantee that every employee will treat confidential account numbers, Social Security numbers, passport numbers or other personal data with Continue Reading

Zero to Snap – Rev up your packaging

Software developers often have enough to worry about. Their focus is creating the best application they can, often without having to consider packaging. We recently discovered Akira, which illustrates this well. The small team of developers are hard at work on the application, so software packaging isn’t a high priority Continue Reading

Securing Legacy IT Systems from Modern Application Threats in the Financial Sector

The rhetoric surrounding mainframes and their uses in modern enterprises tends to be largely negative. Mainframes are seen by many as outdated legacy IT systems that are, or will be, obsolete in the near future as businesses increasingly move to the cloud. However, these notions are one-sided. The reality is Continue Reading

>