Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Guard Your Business Like a Warrior with These 10 Tools

Cybersecurity has been a core issue in business management and growth. As businesses try to manage more remote teams, it’s important now more than ever. With technology becoming an integral part of our everyday lives, we’re exposed to an ever-growing risk of cyber-attacks and malicious technological crimes. According to a recent study, on average, hack attacks occur every 39 seconds. That is, one in three Americans is a victim of cybercrime every year.

Top 5 Reasons for Enterprises to Modernize their Applications to Cloud

While the secret of change is to focus all your energy not on fighting the old, but on building the new, adaptability is about the powerful difference between adapting to cope and adapting to win. Enterprises that overlook modernization are sure to fail in fulfilling critical compliance and security problems thus, endangering both, their businesses and customers.

CI/CD Detection Engineering: Splunk's Security Content, Part 1

It's been a while since I've had the opportunity to take a break, come up for air, and write a blog for some of the amazing work the Splunk Threat Research team has done. We have kept busy by shipping new detections under security-content (via Splunk ES Content Update and our API). Also, we have improved the Attack Range project to allow us to test detections described as test unit files.

Nation-State Espionage Targeting COVID-19 Vaccine Development Firms - The Actions Security Teams Need To Take Now!

Throughout the duration of COVID-19, there have been consistent rumors of increased nation-state espionage. In parallel, many recent ransomware strains have a COVID-19 tie-in. Now the United Kingdom's National Cyber Security Centre (NCSC), published an advisory report that the threat group APT29 is targeting governmental, diplomatic, think-tank, healthcare and energy targets for intelligence gain which are involved in COVID-19 vaccines development and testing.

Featured Post

Appfleet - an edge cloud platform for improving the efficiency of business processes - launched

Appfleet - an edge hosting platform that allows companies to easily deploy docker containers in multiple locations at the same time, improving the efficiency of business processes and reducing latency - is debuting on the market. Ultimately, this solution is to replace limiting and expensive serverless services, managed kubernetes solutions and complex multi-regional cloud deployments.

The LLMNR/NBT-NS strike

Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when the DNS name resolution, which is the conventional method, fails to do so. When a DNS server is unable to resolve a request from a requester machine, the latter broadcasts a message to its peer computers asking for the location of the required server. Hackers leverage this operation to steal the credentials of the requester machine.

Introducing the Datadog IoT Agent

From smart thermostats and grocery store checkouts to public utility infrastructures and industrial manufacturing lines, the Internet of Things (IoT) is all around us—and growing larger every day. But with this rapid growth comes a number of operational challenges: IoT devices collect a large amount of data, and are often distributed across harsh, ever-changing environments.

5 Tips for Getting Alert Fatigue Under Control

What happens when you receive a notification that something is wrong with your system and you have no clue what it means, or why you’re receiving that alert? Maybe you have to parse through the alert conditions to suss out what the alert indicates, or maybe you need to ping a coworker and ask. Not knowing what to do with an alert also contributes to alert fatigue, because it increases the toil and time required to respond.

Detect CVE-2020-8557 using Falco

A new vulnerability, CVE-2020-8557, has been detected in kubelet. It can be exploited by writing into /etc/hosts to cause a denial of service. The source of the issue is that the /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager, so it’s not taken into account when calculating ephemeral storage usage by a pod.