Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introduction to Endpoint Management: Definition, Benefits, and Tools

Endpoint Management is so inherent to IT that it is canon in this industry, especially now that remote work is the new normal. Setting a robust system is paramount for any organization that relies on digital devices. These devices are connected to the corporate network and can access its resources, so the goal is to ensure that these devices are secure, compliant with company policies, and operating efficiently.

Debunking Misconceptions About MDR

With the cybersecurity landscape evolving rapidly, Managed Detection and Response (MDR) has emerged as a major component for MSPs looking to safeguard organizations against increasingly sophisticated threats. However, despite its growing importance, there are still a number of misconceptions around the technology that can hinder its adoption. In this blog, we challenge some of these myths and highlight the significance of MDR in today’s IT environments, particularly for MSPs.

XZ Vulnerability

You drink tap water every day, right? Do you know who invented the filtering mechanism that makes water pure and clean?… Well, do you actually care? Do you know that this mechanism is exactly the same in all the taps of all the houses of any country? Do you know that this specialized piece is the work of an engineer who does it just because? Can you imagine what could happen if this person had a bad day?

Inventory and remediate Red Hat Enterprise Linux with Security Technical Implementation Guides (STIGs)

Security Technical Implementation Guides (STIGs) are an excellent body of knowledge to leverage in securing your infrastructure. With the stig-rhel-7 module you can easily add inventory and remediation policy for RHEL 7 with CFEngine. Do note that as of March 2024 this module does not provide comprehensive coverage but rather an initial 10 findings are implemented.

xz Backdoor: What to Know + What to Do About the XZ Utils Vulnerability

The xz backdoor is a vulnerability in XZ Utils, a popular data compression library. The xz backdoor can let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, who’s affected, and what you can do now to find out if your systems are at risk.

Feature Friday #3: execresult_as_data()

When you want to inspect both the return code and output from a command execresult_as_data() might be the function you are searching for. Most CFEngine policy writers have used execresult() and returnszero(). They are useful when you want to do something based on the output of a command or based on its successful execution (returning zero). For example: /tmp/feature-friday-3.cf command output But, sometimes, you care about specific return codes.

How to Manage Sensitive Log Data

According to Statistia, the total number of data breaches reached an all-time high of 3,205 in 2023, affecting more than 350 million individuals worldwide. These breaches primarily occurred in the Healthcare, Financial Services, Manufacturing, Professional Services, and Technology sectors. The mishandling of sensitive log data provides an on-ramp to many of the most common attack vectors.
Sponsored Post

5 Proactive Security Engineering Techniques for Cloud-Native Teams

Developing a proactive security strategy can potentially save an organization millions of dollars per year. According to IBM, the average cost of a data breach in 2023 added up to a staggering $4.45 million, up 15% over the last three years. This is especially true for cloud-native environments, which face unique security challenges due to their dynamic nature. Instead of waiting to respond to cybersecurity incidents after they happen, it's much better to embrace a proactive approach, and prevent them in the first place.

9 Creative and Practical Uses for NFC Tags

The NFC (Near Field Communication) technology presents many opportunities to improve our lives. These small tags can store vast information and commands that simplify tasks and automate routines. With the NFC, you can significantly simplify your life processes while free to customize their functionality to your preferences. Here's a curated list of creative and pragmatic ways to use NFC tags to your advantage.