Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to leverage SIEM to meet the GDPR's requirements

Today’s businesses run on data. From getting customer information for payment, processing employee information for payroll, using publicly available data for targeted advertising, to tracking people’s behavior for marketing, data has become the power center of organizations. But with this increased emphasis on data, organizations are now burdened with greater responsibilities.

Amazon EKS monitoring and security with Sysdig.

Amazon Elastic Container Service for Kubernetes (Amazon EKS) provides Kubernetes as a managed service on AWS. It helps make it easier to deploy, manage and scale containerized applications on Kubernetes. Sysdig cloud-native intelligence solutions – Sysdig Monitor, and Sysdig Secure – provide Amazon EKS monitoring and security from a single agent and unified platform. Sysdig helps AWS customers see more, secure more, and save time in troubleshooting deployed microservices.

ManageEngine Extends Its SIEM Solution's Log Management Capabilities to the Cloud

PLEASANTON, Calif. - July 17, 2018 - ManageEngine, the real-time IT management company, today announced that it has extended the log management capabilities of its security information and event management (SIEM) solution, Log360, to the cloud.

Docker image scanning - How to implement open source container security (part 2).

In this article we will cover Docker image scanning with open source container security / image scanning tools. We will explain how to to deploy and setup Docker image scanning: both on private Docker repositories, and as a CI/CD pipeline validation step. We will also explore ways of integrating image scanning with CI/CD tools like Jenkins, Kubernetes runtime configuration features and runtime security tools like Falco.

Runtime container security - How to implement open source container security (part 1).

Container security is top-of-mind for any organization adopting Docker and Kubernetes, and this open source security guide is a comprehensive resource for anyone who wants to learn how to implement a complete open source container security stack for Docker and Kubernetes.

Kubernetes run-time security: Automate Sysdig Falco deployment using Helm charts.

So, you want to implement run-time security in your Kubernetes cluster? If you are looking for an open-source tool, obviously Sysdig Falco is the way to go :). You can install Falco as a daemonSet, but as we wanted to make things even easier and natively integrated, we have packaged Falco as a Helm chart, the Kubernetes package manager.

Never postpone your product's security

If you ever (have to) ask yourself “When is the right time to address security issues?”, you’re already late to the party. Security isn’t that layer that you just add on top of your application before shipping it to production. Security is a mindset, that constant voice inside your head which asks “Is this safe?” each time you code something that pulls data out of storage or changes structures based on a user’s action.