Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What is so Pro in Ubuntu Pro?

Open source is everywhere, but what’s its role in your company? According to Synopsys 2023 OSSRA research, around 96% of companies use open source in their codebases. From which at least 84% contained known vulnerabilities. Nowadays vulnerability exposure lasts for around 98 days, which means that the majority of companies are not fixing known vulnerabilities in their codebases for 3 months. This is simply not acceptable.

What is Palo Alto Panorama?

Palo Alto Panorama is a network management system (NMS) that provides excellent security updates and static rules in a constantly changing world. The modern world is implementing more technology into our daily lives, so we need more creative and innovative solutions to protect our data and information. Implementing Palo Alto Panorama will reduce administrator workload by building a dashboard where you can monitor all of your IT operations in one place, in real-time.

Amazon Security Lake & ChaosSearch deliver security analytics with industry-leading cost & unlimited retention

Amazon Security Lake is a new service from Amazon Web Services (AWS) that is designed to help organizations improve their security posture by automating the collection, normalization, and consolidation of security-related log and event data from integrated AWS services and third-party services (Source Partners). By centralizing all the security data in a single location, organizations can gain greater visibility and identify potential threats more quickly.

Kubernetes Security: Secrets from the Trenches

Kubernetes is a popular open-source container orchestration platform. It is highly configurable and feature-rich, but it also requires a deep understanding of containerization. When you are running Kubernetes in production, you need to account for cluster monitoring and logging, governance, and security. In this article, you will learn about Kubernetes security, including pro tips to help you handle architecture concerns, dependencies, and container vulnerabilities.

The new ransomware-as-a-service (RaaS) operation MichaelKors

A new ransomware-as-a-service (RaaS) operation called MichaelKors has recently emerged, which targets Linux and VMware ESXi systems. The cybersecurity firm CrowdStrike warns that this trend is significant since ESXi does not support third-party agents or antivirus software which makes it an attractive target for cybercriminals.

The Dark Side of DevSecOps and the case for Governance Engineering

For today’s software organizations security has never been more top of mind. On one side there is the present and growing threat of being hacked by malicious actors, set out in Crowdstrike’s recent Global threat report. And, on the other, there is a wave of cybersecurity regulation from the government to mitigate such cybersecurity vulnerabilities.

The Swedbank Outage shows that Change Controls don't work

This week I’ve been reading through the recent judgment from the Swedish FSA on the Swedbank outage. If you’re unfamiliar with this story, Swedbank had a major outage in April 2022 that was caused by an unapproved change to their IT systems. It temporarily left nearly a million customers with incorrect balances, many of whom were unable to meet payments.

SIEM Tools: For Enhanced Threat Intelligence and System Security

SIEM is an overarching mechanism combining Security Event Management (SEM) and Security Information Management (SIM). It is a combination of different tools such as Event Logs, Security Event Logs, Event Correlation, SIM etc. These work in tandem to provide you an up-to-date threat intelligence infrastructure and enhanced security for your applications and hardware.