Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

DevSecOps: Agile Security in the Face of Rapid Change

Security is top of mind for every organization. But with the rapid pace of change that comes with digital transformation, how do organizations keep their products and solutions secure when they are constantly evolving? Learn how a leading organization is using PagerDuty to improve cybersecurity incident response while building security into its products through DevSecOps practices.

Introduction to Kubernetes Network Policy with Use Cases

In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.

Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3

TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.

Improving Security Forensics in Kubernetes Environments

The success of Kubernetes has made monitoring and alerting more difficult for traditional Security Information and Event Management (SIEM) tools. Attend this live webinar to learn how implementing the right network security and compliance solution will improve the accuracy and completeness of security forensic monitoring and alerting when using Kubernetes.

NIF, World's Largest Laser and Splunk

When you work with the world’s largest laser, you need secure and reliable IT Infrastructure. The National Ignition Facility uses Splunk Enterprise and Splunk IT Service Intelligence (ITSI) to improve control systems reliability, maximize system uptime and performance and proactively monitor and respond to IT and security challenges.

Simplifying security auditing, part 6: Compliance and the cloud

In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security. While those concerns are still valid, technological advancements have created new scenarios that need to be addressed.