Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What is System Hardening? Definition and Best practices

System hardening means locking down a system and reducing its attack surface: removing unnecessary software packages, securing default values to the tightest possible settings and configuring the system to only run what you explicitly require. Let’s take an example from daily life.

Securing Your Monitoring Software With mTLS

Mutual transport layer security (mTLS) is an important subject among security, reliability, and engineering professionals who need to secure API communication as well as communication between machines and the applications and services they run. And for good reason: in 2022, the global average cost of a data breach was US$4.35 million, and almost double that in the United States at US$9.44 million.

How Domain Name Security Helps Prevent DNS Hijacking

You're probably aware of some security best practices to keep your business's digital presence safe. This might include uptime monitoring, security checks, and many others. But what about domain name security? Securing your business's domain name helps prevent commonplace domain hijacking and the associated chaos that comes with this specific type of cybercrime.

Empowering SecOps Admins: Getting the Most Value From CrowdStrike FDR Data With Cribl Stream

In this live stream, Sidd Shah and I discuss how Cribl Stream can empower Security Operations Admins to make the most of their CrowdStrike FDR data. They address the challenges faced by CrowdStrike customers, who generate a vast amount of valuable data each day but struggle to leverage it fully due to complexity and size.

5 tips on how Developers, DevOps and security teams can work together

As we all know, team collaboration can sometimes be a bit complicated. Especially when different teams in the organization strive to achieve their own individual goals. This is where new organizational practices, such as DevOps and DevSecOps, have paved the path for us to work together and achieve our mutual goals. Take a look at these three trying to make it work… Triple Therapy for your Dev, Sec AND Ops Teams.

How Are SASE and SD-WAN Related?

SD-WAN and SASE both build on traditional network models, such as those used to connect a company’s offices. While the two models share some features and advantages, they have different structures and approaches. In the simplest terms, an SD-WAN inspects and routes data more efficiently, while a SASE combines networking and security functions into a single service. Here’s what you need to know.

Outlook Zero-Day (CVE-2023-23397) Fix for N-central and N-sight

As you likely be all too aware, there is a Microsoft Outlook zero-day vulnerability listed under CVE-2023-23397. With the increased attacks on Outlook this month, Microsoft has pushed out fixes for about 80 Windows flaws. More information on some of those patches can be found in my colleague Lewis Pope’s March 2023 Patch Tuesday blog. Lewis was also kind enough to send over the remediation script for both N-able N-central and N-able N-sight.

Control and Audit Remote Control Actions for Security

In an article a few months ago, my colleague covered the functionality within eG Enterprise that ensures secure and traceable audit trails for both users and admins of eG Enterprise allowing automated auditing and reporting for regulatory compliance and security, see Auditing Capabilities in IT Monitoring Tools | eG Innovations. Today, I will follow from this article and cover how eG Enterprise also controls and audits the execution of Remote Control Actions and scripts.

Map cloud security risks and visualize anomalies with Spot Security

One of the biggest challenges in using cloud infrastructure is the ever-increasing noise in cloud security. Therefore, it is now more important than ever to create focused risk visibility for your critical business units and business-critical applications (a.k.a. “crown jewels”). However, creating visibility in silos does not sufficiently address the above problem.