Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Cybersecurity challenges of the work-from-home model

Just recently, the World Health Organization declared coronavirus a global pandemic. This decision brought with it several health and safety measures, and normal life came to a halt in many countries. This resulted in many organizations around the world adopting telecommuting methods to prevent the spread of COVID-19. While people are adjusting to the sudden changes in the way they work, cybercriminals are using this opportunity to exploit new vulnerabilities the work-from-home environment presents.

What Is an SSL Certificate?

You may have noticed some URLs have the added S after “http.” This means a site has SSL security. SSL stands for Secure Sockets Layer. It keeps sensitive information, like social security numbers, credit card numbers, login credentials, or medical records, from being intercepted by encrypting the data while it passes between servers. Now, you might be thinking, if I don’t sell things online then I don’t need SSL security. Think again.

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of creating and enforcing a solid cybersecurity strategy for employees who work remotely.

SQL Server, Part 1: Why you should monitor SQL logs

Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the top most targeted assets for malicious actors to exploit organizations’ confidential data. Often, organizations don’t realize their databases have been compromised for months. Once sensitive data is leaked, the damage can’t be undone.

Hardening Windows security: How to secure your organization - Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game. Living-off-the-land attacks, or LOTL, is one clear trend today, with attackers exploiting preinstalled features and default tools built into system.

Securing Tekton pipelines in OpenShift with Sysdig

In this blog post, you’ll learn how to create a reusable Sysdig Secure image scanning task, for Tekton pipelines and Openshift clusters, that can be deployed in many pipelines. As a DevOps engineer, you want to deliver applications fast but keeping compliance with security standards like CIS, PCI DSS or NIST 800-190, GDPR can be an arduous task. You might implement image scanning in your CI/CD pipelines to detect and resolve issues such as known vulnerabilities and incorrect configurations.

Keep your Network Secure and Running for Home Office Users

Just like many companies in these trying times, we too have asked many of our employees to work from home to protect their health. As a consequence, our network traffic characteristics have changed dramatically. In this webinar, we would like to share our experience with three of the most concerning issues we’ve come across to ensure a productive and safe workplace for home office employees. Pavel Minarik, Flowmon’s CTO will explain, and show live, how we secured sufficient VPN bandwidth, managed our uplink utilization and minimized risks introduced by personal assets.