Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Demystifying Zero Trust: Understanding the Zero Trust Security Model

In the previous blog post we looked at why it’s important for MSPs to get to grips with Zero Trust and Zero Trust Network Access, as well as how to explain the benefits to customers. In this post we’re going to take a deeper dive into some of the philosophy and principles behind Zero Trust.

A New Era of Cloud Security with Cribl and Wiz

Cribl is an integrations company at heart. We want to help every company develop a data strategy that gives them more control, improves security, and provides flexibility to adapt to their ever-changing data needs. Today, we’re thrilled to announce that we are a Certified Wiz Integration (WIN) Partner to help customers take their cloud security game to the next level.

Announcement: New Integration With Panther Labs SIEM

Observo.ai is excited to share that we now integrate with Panther Labs, a modern SIEM built for the cloud. This enables Panther users to leverage Observo.ai’s powerful telemetry data pipeline features. Observo.ai was created to help Security and DevOps teams solve their biggest telemetry problems. Using Artificial Intelligence, Observo.ai optimizes and transforms data from any source and routes it to the destinations where it has the most value.

Setup SSO with Azure Entra ID and OneUptime

In this informative and easy-to-follow tutorial, we walk you through the process of setting up Single Sign-On (SSO) with Azure Entra ID and OneUptime. We guide you step-by-step on how to enable SSO for an enterprise application that you’ve added to your Microsoft Entra tenant. We cover everything from signing in to the Microsoft Entra admin center as a Cloud Application Administrator, to configuring SSO in the tenant and the application.

Cribl Collaborates with Microsoft: Empowering Enterprises to Strengthen their Security Operations

As the cybersecurity landscape becomes more and more complex. It seems like we hear about a major breach of a different company every day. Enterprises are looking for robust solutions to help them manage the surge in data and security incidents. That’s why our recent collaboration announcement with Microsoft means so much to us. It’s not just a piece of paper; it’s a testament to our dedication to providing customers with the best tools and solutions for the job.

Aligning Security & Ops with Intelligent Automation

Ivanti’s Alan Taylor previews his hands-on session at ISS 2024, demoing some of the powerful automation tools available to Neurons users and how they can drive better outcomes for IT, security and operations. Three Ivanti customers – Allison Hull from Maxar Technologies, Steve Clime from Fareway Stores, and Barbara Munger from Memorial Health Ohio – give their firsthand perspectives on migrating from Cherwell Service Management to Ivanti Neurons for ITSM.

Data source security in Grafana: Best practices and what to avoid

Recently, an incorrect security report was published, claiming that there’s a SQL injection attack in Grafana. As we have communicated to the security researcher, this report is wrong. Authenticated users in Grafana have the same permissions as the user configured for the underlying data source.

Easily configure which hosts can participate in CFEngine infrastructure management

Two modules are available for this task: allow-all-hosts and allow-hosts. The first module, allow-all-hosts, configures the most open situation which is to accept hosts from anywhere. This is only recommended in network restricted environments such as a local machine’s virtual machine network or other such closed down situations.