Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

DevOps Horror Stories: Repository of Horror

Just when you thought it was safe to go back in the water... Is there anything more frightening than the unknown? Anything the mind can conjure up is frequently scarier than something realized. The shark in Jaws is terrifying because you don’t see it until it’s too late. It’s a silent, relentless death machine, hiding in the water. A software vulnerability is the unknown, hidden deep within an ocean of code, packages and container dependencies.

Millions of IoT devices and routers could have a mega security flaw

An unpatched vulnerability in a popular C standard library found in a wide range of IoT products and routers could put millions of devices at risk of attack. The vulnerability, tracked as CVE-2022-05-02 and discovered by Nozomi Networks, is present in the domain name system (DNS) component of the library uClibc and its uClibc-ng fork from the OpenWRT team.

7 Important Things to Include in Your Company Security Policy

We live in risky times. Security incidents and data breaches are more common than ever and digital-minded companies usually bear the brunt of it. Organizations are constantly at risk and can be compromised in no time by ransomware, cyberattacks, social engineering, and corporate espionage. But, in truth, the most common way companies are undermined and infiltrated is through the actions of individual members inside of the organization itself.

Getting Better Sysmon Data Using Cribl Stream

System Monitor, better known as Sysmon, is one of my favorite security datasets. The data is crazy detailed and offers a great way to power security detection and response since it gives cyber security teams a roadmap to understand exactly what systems or people are doing while they use any Windows operating systems. The avalanche of the data is the downside and why observability engineers need tools like Cribl Stream to manage and enrich Sysmon data to make it more useful and more cost-effective.

NinjaOne Partnership with SaaS Alerts Provides Enhanced Security

Managed Service Providers (MSPs) are charged with protecting their customers from all of the threat vectors that target devices, networks, and applications. The diligence required to provide this level of protection for customers is unending. However, if an MSP is going to properly secure their customers’ environments, they first must secure their own, which is why NinjaOne has collaborated with the cybersecurity company SaaS Alerts to better protect MSPs from RMM supply chain attacks.

Compliance And The Cloud

Having achieved almost consumer-grade accessibility, public cloud adoption is increasingly driven by individual business functions. Enterprise teams no longer need to understand how the technology works, or even where the service operates from. To buy a cloud product they just need a web browser and a credit card. But this level of simplicity raises challenges of its own when it comes to regulatory concerns.

Looming 2022 (and Beyond) Network Security Threats

Every year hackers grow in numbers, aggressiveness, organization, and sophistication. And every year there are new attack types and new areas of IT infrastructure that cybercriminals target. 2022 is no different. We are about a third of the way in already and IT pros and security specialists already have their hands full with new attacks and new issues.

Phishing and Identity Fraud Protection for Remote Teams

Did you know that remote teams are more vulnerable to phishing and identity fraud schemes? In this blog post, we will discuss the dangers of phishing and how you can protect your team from falling victim to scams. We will also provide tips for preventing data loss and protecting your company's confidential information.