Operations | Monitoring | ITSM | DevOps | Cloud

December 2022

Buying a Domain for Your Business: 6 Tech Tips to Help You

When it comes to launching a business, buying the right domain name is critical. A good domain can help you stand out from the competition and create an effective web presence for your company. However, there are some important tech tips that should be kept in mind when selecting a domain name for your business. Knowing what these tips are and how to apply them can make the process of choosing a domain much easier and more successful. In this article, we will discuss six tech tips to keep in mind when buying a domain for your business.

Qovery now supports AWS STS: Protect your resources with temporary access keys

We are excited to announce that Qovery now supports AWS Security Token Service (STS) for all our plans! AWS STS is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for federated users who sign in using Single Sign-On (SSO). These credentials are then used to access AWS resources and services.

CFEngine 2022 retrospective

It’s that time of year again where we reflect & recap all things new with CFEngine from this year. You may recall from the 2021 retrospective that our focus for 2022 would be on collaboration, ease of use, and community engagement. I’m proud to summarize our progress below in these key areas for 2022’s Retrospective and give you a sneak peek at what’s to come in 2023.

6 Types of Access Control for a Residential Building and Which One You Should Choose

If you're building a residential apartment or any other residential property, you want to make sure that the doors are protected so that only authorized people can get in. According to the U.S. Census Bureau and the U.S. Department of Housing and Urban Development, there were 1,526 thousand building permits given in October 2022 and 1,339 thousand housing compilations in the same month.

Getting Amazon GuardDuty alerts via SNS Endpoint

Monitoring your infrastructure and safeguarding it against threats is not easy. Setting up the infrastructure, monitoring, collecting and analyzing information for threat detection, is indeed a cumbersome process. This is where a security monitoring service like Amazon GuardDuty can help. In this blog, we will explore Amazon GaurdDuty service and discuss how integrating it with Squadcast can help you route alerts to the right users for quick and efficient incident response.

Surefire Remote Work Monitoring Hacks For New Businesses

The remote work culture is here to stay because it offers immense benefits, from flexibility to scalability and cost-effectiveness. Not surprisingly, new businesses are keen to embrace the model from the outset. As an entrepreneur looking to save money, it is an ideal alternative that reduces space and infrastructural requirements. But remote monitoring is likely a key concern if you are a beginner. Fortunately, it is easy to track and monitor employees, regardless of their locations. Let us share a few surefire remote work monitoring hacks for new businesses.

4 Types of IT Security Issues Companies Are Facing in a Tech-Enriched Environment

The world around us is changing, and it's changing fast. We're in an era of technology-fueled innovation, where the lines between our personal and professional lives are blurring and being redrawn every day. And we're not just talking about the way we communicate with each other; we're also talking about the way we work. For businesses, this means that they have to be able to connect to customers on their terms: online, on mobile devices, and through social media platforms. But this also means that companies need to step up their game when it comes to security.

Building Cyber Resilient Ecosystems

At SolarWinds, we focus on helping our customers accelerate their business transformation through solutions designed to be simple, powerful, and secure. Over the past couple of years, we’ve made significant investments in our security and software build process with the goal of leading the industry in cyber resiliency. Recently, I spoke at the VentureBeat Intelligent Security Summit on the topic of Becoming Secure by Design with CrowdStrike Vice President of Intelligence Adam Meyers.

CFEngine 3.21 LTS released - Unification

Today, we are pleased to announce the release of CFEngine 3.21.0! The focus of this new version has been unification. Across our websites and UI, you should see that it’s a much more modern and unified experience, whether you’re reading this blog post on cfengine.com, browsing the new documentation site, looking for modules on the CFEngine Build website, or adding input to modules within Build in Mission Portal.

How detection engineering keeps ServiceNow safe

“Security defense is exciting, because you’re always trying to stay ahead of the bad guys,” says Tracy T., senior staff detection engineer at ServiceNow. Who are these bad guys? They could be malware or hackers who try to threaten the security of employee data or the company network—or anything in between. Detection engineering plays a major role in keeping a company safe, especially amid changing tool capabilities and detection methods.

How to build a service mesh with Istio and Calico

Microservices are loosely coupled software that provides flexibility and scalability to a cloud environment. However, securing this open architecture from vulnerabilities and malicious actors can be challenging without a service mesh. This blog post will demonstrate how you can create an Istio and Calico integration to establish a service mesh that will manipulate HTTP traffic in the application layer.

The Critical Role of Intrusion Prevention Systems in Network Security

An Intrusion Prevention System (IPS) is a network security and threat prevention tool. Its goal is to create a proactive approach to cybersecurity, making it possible to identify potential threats and respond quickly. IPS can inspect network traffic, detect malware and prevent exploits. IPS is used to identify malicious activity, log detected threats, report detected threats, and take precautions to prevent threats from harming users.

How Important Is The Infrastructure For Online Trading Services?

In online trading, everything is done by computers and software. It's a huge financial system that heavily relies on well-established underlying technologies. These technologies include fast, secured and reliable internet connection in conjunction with fast hosting provided and reliable data centers. Well-written software, too, plays a big role in this regard.

Enterprise and Edge Scale Security with NeuVector Container Security 5.1

I’m excited to announce the general availability of the SUSE NeuVector container security platform version 5.1. With the 5.1 release, customers will benefit from more efficient and powerful vulnerability scanning and admission controls across multiple clusters through centralized enterprise scanning, auto-scaling scanners and support for the new Kubernetes (1.25+) pod security admission (PSA) standard. The release also supports the Cilium network plug-in.

Jason Chan on How Torq Overcomes Cybersecurity's Biggest Challenges

Jason Chan is one of the world’s foremost cybersecurity authorities and we’re extremely proud to have him as a member of the Torq Advisory Board. He’s a pivotal figure in driving adoption of security automation best practices at many companies, including Netflix, where he led the information security organization.

5 security hardening CFEngine policy examples

Throughout the security holiday calendar, we’ve looked at modules for enforcing security requirements. Writing the policy to achieve these security hardening goals is easy. By learning how, you can write policy (or modules) for any requirements, including those specific to your organization. In this blog post, we’ll take a look at five beginner-level examples to get you started, focusing on the most common resources to manage with CFEngine; files and packages.

Should Your Business Use A VPN?

How we do business is rapidly changing, and companies must adapt to new technologies to stay competitive. As employees increasingly work from home, data security becomes an even greater concern. Therefore, choosing the right Virtual Private Network (VPN) for your small business can greatly impact how secure your employees' data are online. In this blog post, you will learn about the benefit of using a VPN and why it may be worth investing in one for business.

How you can do regulated DevOps with Kosli - Mike Long - CEO - Kosli

In this talk Mike will discuss the state of regulated DevOps, share the Kosli startup journey, what we’ve learned along the way, and briefly demo how Kosli helps regulated DevOps teams to deliver software with continuous compliance. Filmed at Exploring DevOps, security, audit compliance and thriving in the digital age in Oslo Dec 8th at Rebel.

DevSecOps The Broken or Blurred Lines of Defense - John Willis - Kosli

With the modern patterns and practices of DevOps and DevSecOps it’s not clear who the front-line owners are anymore. Today, most organizations' internal audit processes have lots of toil and low efficacy. This is something John has referred to in previous presentations as “Security and Compliance Theater.” Filmed at Exploring DevOps, security, audit compliance and thriving in the digital age in Oslo Dec 8th at Rebel.

How can tech bridge the gap on compliance audit risk and security - Panel Discussion

At Exploring DevOps, security, audit compliance and thriving in the digital age we wrapped up the day with a panel discussion featuring all of our speakers plus Lamisi Gurah - Service Owner / Head of IEP Engineering Productivity at DNB. Come prepared with whatever’s on your mind or follow up on what you’ve heard during the talks. Our speakers would love to take your questions.

Regulations vs DevSecOps Requiem - Diptesh Mishra - CTO - Shoal

Diptesh “Dips” Mishra, CTO for Shoal (a Standard Chartered Venture) will talk about the governance challenges that financial services organisations face when they look to adopt DevSecOps. Dips has worked for Nationwide, Lloyds Banking Group, and RBS and he’ll share key strategies behind successful implementations Filmed at Exploring DevOps, security, audit compliance and thriving in the digital age in Oslo Dec 8th at Rebel.

How to Monitor kube-controller-manager

When it comes to creating new Pods from a ReplicationController or ReplicaSet, ServiceAccounts for namespaces, or even new EndPoints for a Service, kube-controller-manager is the one responsible for carrying out these tasks. Monitoring the Kubernetes controller manager is fundamental to ensure the proper operation of your Kubernetes cluster. If you are in your cloud-native journey, running your workloads on top of Kubernetes, don’t miss the kube-controller-manager observability.

What's new in Calico Enterprise 3.15: FIPS 140-2 compliance, new dashboards, egress gateway pod failover, and more!

Tigera provides the industry’s only active Cloud-Native Application Security Platform (CNAPP) for containers and Kubernetes. Available as a fully managed SaaS (Calico Cloud) or a self-managed service (Calico Enterprise), the platform prevents, detects, troubleshoots, and automatically mitigates exposure risks of security issues in build, deploy, and runtime stages across multi-cluster, multi-cloud, and hybrid deployments.

A guide to cyber threat hunting with Promtail, Grafana Loki, Sigma, and Grafana Cloud

Fact: The Security Operations team at Grafana Labs loves logs. They are a key pillar of observability for many reasons, such as how they are stuffed full of details to help us diagnose the “why?” when things go wrong. This is especially true when the information pertains not to a series of unfortunate events, but instead to an adversary trying to cause us harm.

All I want for Christmas is...no more phishing emails!

It’s the holiday season again, which means family gatherings, good food, and plenty of toasts. It also means a lot of online activity—buying gifts, getting promotional offers, booking deliveries—all of which mean a continuous flow of emails sent to your personal and business accounts. With so much going on, even experienced users can accidentally fall prey to one of the many “hooks” that cybercriminals are putting out there.

Track maintainers and purpose for hosts in your infrastructure

When something goes wrong or looks fishy for a particular host in your infrastructure how do you know who to ask about it? In an infrastructure managed by many and used by many it is also helpful to know what each hosts’ purpose is. In this article we show how to add maintainer and purpose information to individual hosts in your infrastructure via the CMDB feature of Mission Portal. We will also add a Build Module to add this information to the /etc/motd file for each associated host.

File integrity monitoring with CFEngine

File integrity monitoring is an important aspect in managing your infrastructure. Tripwire and AIDE are often cited as necessary tools by compliance frameworks1,2,3. Of course CFEngine can manage a file to make sure it contains desired content, but did you know that CFEngine also has the capability to simply monitor a file for change? In this blog post we take a look at CFEngines’ changes attribute for files promises.

Governance, Risk and Compliance for MSPs in 2023

RedLin Murphy, N-able’s head of Governance, Risk and Complaince, as well as Dave MacKinnon, N-able’s Chief Security Officer discuss current and upcoming regulations that do or could impact MSP’s, what you can do to prepare for these things as cyber governance continues to at both the state and federal levels.

Six Mistakes To Avoid When Mapping Your Enterprise Data Landscape

Any organization that wants to make the most of its data needs to understand its data landscape clearly. Data mapping is essential to achieving this understanding, but it can be a complex task. There are several pitfalls that organizations need to avoid. Here are the six most common mistakes to avoid when data mapping your enterprise.
Featured Post

What's in store in 2023 for the tech industry?

The tech scene is expanding rapidly across the world. In fact, in the last year alone, within the UK, a new tech unicorn was created every eleven days - more than doubling the number of UK unicorns from 2017. From AI and automation, to DevOps and data engineering, innovations are continuing to reshape and improve our everyday and working lives, critical at this time of socio economic instability. Here are thoughts from tech leaders, globally, exploring what 2023 has in store.

Security holiday calendar - Part 1

As it was well received last year, we decided to do another security-focused holiday calendar this year. The concept was roughly the same, but instead of only adding security hardening modules, we’ve also added in some other security advice and blog posts to improve the variety. Now that we’re halfway through to 24 (or 25), let’s recap the first half of the calendar.

Building a Compliance Report based on inventory modules

In CFEngine Enterprise we collect information from each system in the infrastructure as inventory. Some inventory is available by default, and more can be added using modules or writing policy. You can use inventory information to create a Compliance Report with checks that determine if the information complies with your security requirements. In this blog post, we will use some modules from CFEngine Build which provide inventory data, and build a Compliance Report on top of those.

Top 5 benefits of network backup software

One of the leading and most catastrophic causes of is misconfigurations or faulty configurations. This type of downtime may occur at any moment suddenly, even sometimes turning out to be a surprise for network admins. Whenever this type of downtime occurs, it is mandatory for network admins to find the root cause of the issue in order to troubleshoot and then bring the network back up. This is hectic as well as time-consuming, leading to a loss of precious time for the organization.

Grafana 9.3 feature: Grafana OAuth token improvements

As part of our efforts to improve the security of Grafana, we introduced a long-awaited feature in the latest Grafana 9.3 release that enhances Grafana’s OAuth 2.0 compatibility. The new Grafana OAuth token improvements, which are available in Grafana OSS, Grafana Cloud, and Grafana Enterprise, ensure that the user is not only logged into Grafana, but they’re also authorized by the OAuth identity provider.

The What, Why and How of Auto-Remediation in Cybersecurity

When you’re facing a cyberattack, waiting even just minutes to respond could be the difference between business as usual and a calamity. It may only take that long for threat actors to exfiltrate sensitive data or disrupt critical systems. That’s one reason why automating remediation is an essential ingredient in an effective cybersecurity strategy.

How to Augment an Existing Data Lake with Exabeam and Cribl Stream

Organizations have different data lakes they use to search, whether it is Splunk, Qradar, or Sumo Logic just to name a few. Exabeam (UEBA Advanced Analytics) sits on top of those existing data lakes and pulls specific sources by running continuous queries every few minutes into Exabeam. The image below shows a Splunk query to pull windows event logs into Exabeam Advanced Analytics over the port (8089). The query is complex.

The Economics Behind Cloud-First Data Protection

If you’re still reliant on legacy local-first backup, you may not fully realize the financial impact of old-school image backup on your business. In today’s cloud-first world, it’s time to take a look at a modern cloud-first approach to data protection as a service. This webinar will walk you through the hidden (and not so hidden) costs of continuing to manage backup using either an image-based software product (like Veeam) or an integrated appliance (like Datto). We’ll do the math to show you a more cost-effective alternative.

Graylog 5.0 - A New Day for IT & SecOps

We are excited to announce the release of Graylog 5.0! Graylog 5.0 brings updates across our entire product line, including changes to infrastructure, Security, Operations, and our Open offerings. For more detailed information on what’s changed, visit our changelog pages for Graylog Open and Graylog Operations/Graylog Security.

Torq Users Hit 1,000,000+ Daily Security Automations

Security automation is an increasingly critical element in optimizing enterprise cybersecurity postures. Today, Torq announced its users are executing more than 1,000,000 daily security automations using our security automation platform – a major milestone that underlines the traction and importance of unifying today’s complex security stacks.

Don't be held to ransom: Security awareness with Platform.sh

Ransomware is an ever-evolving type of malicious software (a.k.a malware) in which an attacker encrypts the files on a victim’s device, rendering it inaccessible and unusable. Then - you guessed it - they demand a ransom from the target before they’ll fix it. Not something any organization ever wants to deal with, and not something any organization has to deal with if they have the right measures in place to minimize the risk. Let’s talk about how!

4 API Security Best Practices To Safeguard Sensitive Data

Thanks to the increasing usage of different software solutions, API usage has become an everyday practice. As such, API security is a more prevalent issue in app development than ever before. SaaS companies have an average of 350 integrations, whereas major SaaS companies like Slack, Zoom and Shopify have 2,000+ integrations. This is great for developers and end users, as Application Programming Interfaces (API) make life easier.

Baking Security into your DevOps Supply Chain with Argo CD & OPA - Dan Garfield (DevOps Experience)

Argo CD has become the defacto entry for engineering teams to deploy and manage their applications while Open Policy Agent has become one of the most reliable security policy enforcement engines. These two tools work perfectly together and yet there are very few articles and videos on the subject! In this talk, we look at the best strategies for getting these tools to work together to improve the software delivery supply chain. We’ll look at admission hooks, sync waves, and other ways to ensure your applications and clusters are always running in a secure and safe manner. Including example files and reference repos.

Cyber, incident, downtime: Three words that chill the board, and how to tame them

There are three words that every member around a boardroom table fears when they hear them strung together: "Cyber... incident... downtime". They are never the precursor to a good meeting! Technology incidents can leave the business in the dark and bring the wheels of industry grinding to a halt. With no operational systems, a Gartner report found that companies can lose up to half a million dollars per hour from severe incidents based on losses and remediation.

Updates, upgrades, and uptime

All software of any significant size has bugs, vulnerabilities, and other weaknesses. This includes the operating system (OS), libraries, command line tools, services and graphical applications. Across your infrastructure, you should have an overview of what operating systems and software you have installed. Additionally, automated ways of upgrading the OS, as well as packages are desirable.

Reasons to Use a Virtual Private Network

A Virtual Private Network (VPN) is becoming increasingly popular in the modern age of digital connectivity and ever-advancing technology. A VPN is a secure network connection that allows users to access the internet without restrictions or censorship while keeping their data safe and secure. Here are some primary reasons you should consider using a VPN.

Five Hidden Security Risks You May Find with Traditional Backup Mechanisms

It’s always been important for managed services providers (MSPs) to exercise backup best practices but this has become even more important with the pandemic having reset employees’ expectations around remote work. Up to 74% of professionals believe that remote work is here to stay according to Growmotely, while 16% of companies globally are already completely remote and 40% offer hybrid working.

Your Checklist for an Application Blocklist

With the advent of remote and hybrid work, the line that separates work from personal life is increasingly hazier. This thinking applies especially to our digital lives. When work still revolved around fixed hours on-site, admins could easily determine which applications to block. For example, a worker should not be able to access the Netflix application at the office during business hours.

Top 6 Emerging Cybersecurity Challenges For 2023

Protecting sensitive data from malicious code and dangerous third parties is a critical task rather than something that should be taken for granted. With that in mind, it's an important - yet often overlooked - aspect of security that users stay informed about what's happening in this niche. After all, data security threats evolve at a staggering pace, and 2023's future cyber-attacks are bound to be as inventive as they've ever been.