Tag: Security

Search
Grafana's OAuth Identity Token security patch

Important security patch released in Grafana 8.3.4 and 7.5.13

Grafana’s versions 8.3.4 and 7.5.13 were released on January 18th, 2022. These two new versions include some patches to fix important security issues for all installations of Grafana 7.5.x and 8.x. These versions are only vulnerable in case that the administrator has used “OAuth forwarding” for data sources and uses API keys. OAuth Identity Token

READ MORE
Zero Trust security model

What is the Zero Trust security model?

Zero Trust is an approach to the design and implementation of IT systems based on the principle of “never trusting, always verifying” every device. In this security model, inherent trust in the network is removed; no matter whether a device is within a corporate LAN or whether it has already been verified before. Every request-response

READ MORE
SSH Secure Shell protocol

SSH protocol: usage, versions and implementations

SSH, short for Secure Shell, is a remote administration and network protocol; originally designed to replace Telnet and other unsecured protocols such as the Berkeley Remote Shell (rsh). SSH enables secure remote system administration and file transfer over unsecured networks. In this article we will talk about the SSH protocol and its versions, SSH clients

READ MORE
Plan a secure migration to the cloud

6 key elements for a secure migration to the cloud

When migrating to the cloud, security must be taken into consideration from the beginning. By preparing a secure migration to the cloud, you will not only avoid many risks, but also save a lot of time and money. There are many factors to consider when migrating to the cloud, from your company’s current security measures

READ MORE
Drawing of the ceremony room and safe room of the Root KSK ceremony

Root DNSSEC KSK Ceremony

The Root DNSSEC KSK (Key-signing Key) Ceremony is a strict procedure during which the DNS root zone’s public keying information is signed for the three months following it. The KSK is the key used to sign the set of Zone-signing Keys (ZSK) every three months; being the trust anchor of the Domain Name System (DNS).

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.