Tag: Security

Grafana's OAuth Identity Token security patch

Important security patch released in Grafana 8.3.4 and 7.5.13

Grafana’s versions 8.3.4 and 7.5.13 were released on January 18th, 2022. These two new versions include some patches to fix important security issues for all installations of Grafana 7.5.x and 8.x. These versions are only vulnerable in case that the administrator has used “OAuth forwarding” for data sources and uses API keys. OAuth Identity Token

READ MORE
Encriptación PGP, Pretty Good Privacy

PGP, cryptographic privacy and authentication

PGP provides cryptographic privacy and authentication when communicating or transferring data over the Internet. How does it do so? By using public-key cryptography, symmetric-key cryptography and digital signatures. We share a lot of data in our daily lives, both professionally and personally, and privacy is a top priority. On this matter, PGP is one the

READ MORE
Zero Trust security model

What is the Zero Trust security model?

Zero Trust is an approach to the design and implementation of IT systems based on the principle of “never trusting, always verifying” every device. In this security model, inherent trust in the network is removed; no matter whether a device is within a corporate LAN or whether it has already been verified before. Every request-response

READ MORE
SSH Secure Shell protocol

SSH protocol: usage, versions and implementations

SSH, short for Secure Shell, is a remote administration and network protocol; originally designed to replace Telnet and other unsecured protocols such as the Berkeley Remote Shell (rsh). SSH enables secure remote system administration and file transfer over unsecured networks. In this article we will talk about the SSH protocol and its versions, SSH clients

READ MORE
Security Operations Center

What is a Security Operations Center (SOC)?

In IT, a Security Operations Center (SOC) or Information Security Operations Center (ISOC) is a centralized location where an organization’s security team monitors, analyzes, detects and solves any security events that might arise. A SOC is usually established to protect sensitive data and comply with industry or government regulations. It involves a very proactive approach

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
Plan a secure migration to the cloud

6 key elements for a secure migration to the cloud

When migrating to the cloud, security must be taken into consideration from the beginning. By preparing a secure migration to the cloud, you will not only avoid many risks, but also save a lot of time and money. There are many factors to consider when migrating to the cloud, from your company’s current security measures

READ MORE
Drawing of the ceremony room and safe room of the Root KSK ceremony

Root DNSSEC KSK Ceremony

The Root DNSSEC KSK (Key-signing Key) Ceremony is a strict procedure during which the DNS root zone’s public keying information is signed for the three months following it. The KSK is the key used to sign the set of Zone-signing Keys (ZSK) every three months; being the trust anchor of the Domain Name System (DNS).

READ MORE
Data protection and data sovereignty in the digital economy

Data protection and data sovereignty in the digital economy

Data protection and privacy has become an essential right; due to the leading role of data in our modern economy. It is key both for building trust and for creating added value and, therefore, growth. As a result, data sovereignty measures have been adopted around the world to protect the citizens’ data. Although data management

READ MORE
Stackscale at CISO Day 2020 cyber security event

Stackscale participates in the CISO Day 2020 event

This year we participate as sponsor in the CISO Day 2020 event that will take place on September 17, in a hybrid format. CISO Day is a yearly cyber security congress, focused on the role of Chief Information Security Officers, organized by CyberSecurity News. This event is targeted to all kinds of cyber security professionals

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Would you like to know more about Stackscale and our services?

Don’t hesitate to contact us for asking any question you have and discovering more about our Private Cloud, infrastructure and Bare Metal! We will be happy to know more about your project and see if we can grow together!