Advanced Message Security (AMS) - IBM MQ

Advanced Message Security (AMS) is a feature of IBM MQ designed to safeguard sensitive data while it travels across the IBM MQ network. Further reading Overview of Advanced Message Security - IBM Documentation Qualities of protection available with AMS - IBM Documentation Related IBM MQ

1 min

Checkmarx

Checkmarx is a US company that develops and sells application security software. Further reading About Checkmarx (Corporate site) Checkmarx (Wikipedia) Related Zed Attack Proxy (ZAP)

1 min

Cloud Security Alliance (CSA)

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes best practices for securing cloud computing environments through research, education, and industry collaboration. Related Cloud Control Matrix (CCM)

1 min

Cyber resilience frameworks

Cyber resilience frameworks provide practitioners with a structured approach to manage and mitigate cybersecurity risk, ensuring organisations can identify, respond and recover from a range of evolving threats. Frameworks such as the NIST Cybersecurity Framework (CSF) and ISO 27001, offer best practices, example controls, and guidelines to strengthen security posture, align with regulatory requirements, and build operational resilience. By adopting a suitable framework, organisations can improve governance, increase the ability to respond to incidents, safeguarding critical systems, data, and processes. ...

1 min

Data Protection

Data protection refers to the practices, safeguards, and rules put in place to protect personal information and ensure that individuals’ privacy rights are respected. Data protection procedures in an organisation will involve the secure handling of data to prevent unauthorised access, disclosure, alteration, or destruction. Effective data protection measures are essential for maintaining trust, and for compliance with legal and regulatory requirements. Related pages Data privacy Data classification Data disposal Worldwide data transfer Data controller Data processor Data subject rights Data breach

1 min

Encryption

Encryption is the process of scrambling data to make it unreadable to unauthorised individuals in order to protect its confidentiality. Technically, this involves using an algorithm and a cryptographic key to transform the original plaintext (readable data) into ciphertext (unreadable data). Only individuals who possess the corresponding decryption key can reverse this process and restore the data to its original readable form. Further reading The Code Book, by Simon Singh

1 min

Kubernetes Secrets

Kubernetes Secrets provide a secure way to manage sensitive information, such as passwords, tokens, or keys, by storing and then accessing them separately from application code. This reduces the risk that the secret is exposed when working with pods or containers. Best Practice Good practices for Kubernetes Secrets (Official Documentation) Best practices for Kubernetes Secrets management (Snyk) How to Handle Secrets in Kubernetes (GitGuardian) Further Reading Kubernetes Secrets (Official Documentation) ...

1 min

Secrets Management

0 min