Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Cybersecurity Risk Management: Introduction to Security Analytics

It’s mid-morning. You’re scanning the daily news while enjoying a coffee break. You come across yet another headline broadcasting a supply chain data breach. Your heart skips a quick, almost undetectable, beat. You have the technology in the headline in your stack. You set aside your coffee and begin furiously scanning through the overwhelming number of alerts triggered across all your technologies.

Splunk Indexer Vulnerability: What You Need to Know

A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to explain the affected components, the severity of the vulnerability, mitigations you can put in place, and long-term considerations you may wish to make when using Splunk.

Get Back to the Basics for World Backup Day 2022

In recent weeks, international headlines have been dominated by the Russia-Ukraine war and its potential to escalate into cyberspace due to punishing economic sanctions by the west. On March 21st, 2022, the Biden administration released a statement calling for the public and private sector to “accelerate efforts to lock their digital doors” in light of the Russian cyber threat.

Why ZTNA Solutions are Important Right Now

2021 marked the fifth consecutive year of record-breaking security attacks. Zero-Day attacks skyrocketed, with 66 exploits found to be in use, more than any other year on record and almost double 2020’s figure. Meanwhile, a staggering 66% of organizations have suffered at least one ransomware attack in the last year, with the average ransom payment soaring by 63% to $1.79 million (USD).

Top 3 Reasons Why You Should Work with a ZTNA Service Partner

With remote and hybrid working now commonplace for organizations, many IT departments are weighing up the pros and cons of moving to a Zero Trust Network Access (ZTNA) model to replace traditional VPN, or other remote access approaches. While the benefits of moving to ZTNA are compelling: improving user experience, providing enhanced security, reducing management overhead, and increasing visibility and control, it can often be a challenge to select the best approach for your business.

CIS Control Compliance and Centralized Log Management

Your senior leadership started stressing out about data breaches. It’s not that they haven’t worried before, but they’ve also started looking at the rising tide of data breach awareness. Specifically, they’re starting to see more new security and privacy laws passed at the state and federal levels. Now, you’ve been tasked with the very unenviable job of choosing a compliance framework, and you’re looking at the Center for Internet Security (CIS) Controls.

Netreo Further Strengthens Security Posture, Earning Veracode Verified Team Recognition for Entire Product Line

Huntington Beach, Calif. – March 23, 2022 – Netreo, the award-winning provider of IT infrastructure monitoring and observability solutions and one of Inc. 5000’s fastest growing companies, today announced the company has achieved Veracode Verified Team status for Netreo’s full-stack monitoring and observability suite.

Red Team vs. Blue Team: The Role of Each in Finding Your Cybersecurity Weakness

As the modern world moves almost entirely online, so do the issues we used only to face in the physical world. In years gone by, security may have taken the form of a CCTV camera or a person hired to ensure customers don't steal from your premises. Well, as you can probably tell, neither of these solutions works when it comes to cybersecurity and keeping a business safe online.

Automated Zero Trust: The Only Thing to Put Your Trust in

There’s no question that centralized identity and access management (IAM) helps companies reduce risk and prevent attacks. But, as this week’s Okta attack shows, centralized IAM doesn’t eliminate all risks. Attackers with access to IAM data can use this information to easily access downstream systems or modify permissions to grant elevated access to malicious parties.