Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Top 3 SIEM Optimizations - How to Get More From Your Existing Tech Stack

In today’s digital-first world, most security problems are actually data problems, and data volumes are outpacing organizations’ abilities to handle, process, and get value from it. You’ll have 250% more data in five years than you have today, but the chances of your budget increasing to match that are slim. The challenges that come with managing the rise in enterprise data volume directly affect your ability to adequately address cybersecurity risks.

Zero trust security for CI/CD pipelines

The zero trust security model is an approach to network security that enforces strict access controls and authentication at every stage of the software development lifecycle. It treats every user, device, and transaction as a security risk and uses the principle of least privilege to restrict access to sensitive resources and minimize the potential attack surface.

Migrating to cfbs

Traditionally, CFEngine policy sets are managed as a whole. When upgrading the Masterfiles Policy Framework (MPF)1 users must download the new version of the policy framework and integrate it into the existing policy set, carefully diffing the vendored policy files against their currently integrated policy. Updates to policy authored by others must be sought out and similarly integrated.

Don't Take the Bait: Tips to Avoid Falling Victim to Phishing and Baiting

The old days of a hacker sitting alone in a basement typing feverishly to breach a database are over. That's just for the movies. In the real world, almost all cyberattacks are socially engineered, meaning we fall for scams. Of course, there are levels to creating a scam. It can range anywhere from getting an email from a Nigerian prince claiming you've won millions of dollars to an email from your bank asking for your personal information. With so many situations to look out for, here are some general tips so you don't take the bait.

Why Your Observability Strategy Needs Security Observability

An observability strategy helps many businesses support the stability and performance of complex, distributed IT environments. Since you may already be tracking the three pillars of observability—metrics, logs, and traces—why shouldn’t you also use the endless stream of telemetry data to identify security risks and vulnerabilities, just as you use it to monitor and stabilize operations? Even the best-planned observability strategy is incomplete without the fourth pillar of security.

Grafana Labs partners with GitHub to enable secret scanning

As part of our ongoing commitment to security, we are excited to announce we have partnered with GitHub to protect our users on public repositories via GitHub’s secret-scanning feature. Through the partnership, GitHub will notify Grafana Labs when one of the following secret types is exposed in the code of a public repository: GitHub actively monitors public repositories for leaked secrets. When a secret is detected, its hash is stored in Grafana Labs’ Secret Scanning API.

What is so Pro in Ubuntu Pro?

Open source is everywhere, but what’s its role in your company? According to Synopsys 2023 OSSRA research, around 96% of companies use open source in their codebases. From which at least 84% contained known vulnerabilities. Nowadays vulnerability exposure lasts for around 98 days, which means that the majority of companies are not fixing known vulnerabilities in their codebases for 3 months. This is simply not acceptable.

What is Palo Alto Panorama?

Palo Alto Panorama is a network management system (NMS) that provides excellent security updates and static rules in a constantly changing world. The modern world is implementing more technology into our daily lives, so we need more creative and innovative solutions to protect our data and information. Implementing Palo Alto Panorama will reduce administrator workload by building a dashboard where you can monitor all of your IT operations in one place, in real-time.

Amazon Security Lake & ChaosSearch deliver security analytics with industry-leading cost & unlimited retention

Amazon Security Lake is a new service from Amazon Web Services (AWS) that is designed to help organizations improve their security posture by automating the collection, normalization, and consolidation of security-related log and event data from integrated AWS services and third-party services (Source Partners). By centralizing all the security data in a single location, organizations can gain greater visibility and identify potential threats more quickly.