Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Inventory and remediate Red Hat Enterprise Linux with Security Technical Implementation Guides (STIGs)

Security Technical Implementation Guides (STIGs) are an excellent body of knowledge to leverage in securing your infrastructure. With the stig-rhel-7 module you can easily add inventory and remediation policy for RHEL 7 with CFEngine. Do note that as of March 2024 this module does not provide comprehensive coverage but rather an initial 10 findings are implemented.

xz Backdoor: What to Know + What to Do About the XZ Utils Vulnerability

The xz backdoor is a vulnerability in XZ Utils, a popular data compression library. The xz backdoor can let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, who’s affected, and what you can do now to find out if your systems are at risk.

Feature Friday #3: execresult_as_data()

When you want to inspect both the return code and output from a command execresult_as_data() might be the function you are searching for. Most CFEngine policy writers have used execresult() and returnszero(). They are useful when you want to do something based on the output of a command or based on its successful execution (returning zero). For example: /tmp/feature-friday-3.cf command output But, sometimes, you care about specific return codes.

How to Manage Sensitive Log Data

According to Statistia, the total number of data breaches reached an all-time high of 3,205 in 2023, affecting more than 350 million individuals worldwide. These breaches primarily occurred in the Healthcare, Financial Services, Manufacturing, Professional Services, and Technology sectors. The mishandling of sensitive log data provides an on-ramp to many of the most common attack vectors.
Sponsored Post

5 Proactive Security Engineering Techniques for Cloud-Native Teams

Developing a proactive security strategy can potentially save an organization millions of dollars per year. According to IBM, the average cost of a data breach in 2023 added up to a staggering $4.45 million, up 15% over the last three years. This is especially true for cloud-native environments, which face unique security challenges due to their dynamic nature. Instead of waiting to respond to cybersecurity incidents after they happen, it's much better to embrace a proactive approach, and prevent them in the first place.

9 Creative and Practical Uses for NFC Tags

The NFC (Near Field Communication) technology presents many opportunities to improve our lives. These small tags can store vast information and commands that simplify tasks and automate routines. With the NFC, you can significantly simplify your life processes while free to customize their functionality to your preferences. Here's a curated list of creative and pragmatic ways to use NFC tags to your advantage.

Future Frontiers: The 9 Leading Tech Degrees Shaping Tomorrow

In a world rapidly being reshaped by technology, the right education can be the golden key to unlocking a future filled with opportunities. As we stand on the brink of technological advancements that promise to redefine what's possible, the academic world is evolving to prepare the next generation for careers that might not even exist today.

Tips for Managing a Healthcare Business: From Ensuring HIPAA Fax Compliance To Maintaining the Building

Managing a healthcare business involves multifaceted responsibilities that extend far beyond patient care. Leaders in the healthcare industry must prioritize compliance, embrace technology, foster a supportive work environment, and maintain the highest standards of cleanliness and safety to ensure the best outcomes. Moreover, building strong relationships with patients and the community is essential for cultivating trust in healthcare services. In this article, we will explore practical strategies healthcare managers can implement to meet these critical challenges.