The cloud-native platform for centralized log management
Analytics, visualizations, and workflows purpose built for practitioners
Leading firms gaining more value from their machine data
Any source, any velocity – centralize logs, metrics, and traces for full visibility.
Close the gap between detection and response with an analyst-focused, cloud-native approach.
Understand complex environments with visual analysis and KPIs that matter most.
The most recent articles & research from Devo
By Scott Matteson
Regardless of your career, when you work with technology you’re usually inundated with security risks and threats, many of which are tough to keep up with. Whether you face application or operating system vulnerabilities, insecure passwords, phishing attempts, scams, social engineering gimmicks, or more, it’s important to stay nimble and aware. This can be challenging when there is another data breach or must-patch vulnerability on a weekly basis.
Technology professionals and executives are no strangers to such challenges, but being industry insiders often gives them a leg up on the security realm.
Here is a compilation of the best security tips recommended by both hands-on tech pros and the executives who lead them. Hopefully, this advice will make your job (or consumer endeavors) easier.
The best security tool you can possibly have is common sense. Even the best, bleeding-edge security tech can’t save you from a sophisticated targeted attack. However, here are a few additional digital security tips to keep in mind according to Joe Diamond, Director of Security Product Marketing Management, Okta.
Hacks and breaches these days are rarely black and white. Hackers take time to collect specific personally identifiable information (PII) on people and use that data to either execute phishing attacks on your friends, co-workers, or family members—or possibly even gather enough PII data to open accounts in your name. Below are Mathew Rose, Global Director Application Security Strategy, Checkmarx, tips for how to avoid such attacks.
If you have the fundamentals of cyber hygiene covered, it’s time to think like a CISO who understands how your business works. Julian Waits, GM of Cyber Security at Devo Technology offers his advice below.
Sign up to stay informed with the latest updates from Devo.