Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Top 5 Commercial SIEM Tools

Following our comprehensive introduction to SIEM systems, we looked at the available open source SIEM platforms. In this third article in our SIEM series, we review five of the most popular commercial offerings in this space. We evaluate them by looking at their intended audience and market segment, deployment model, SIEM features (threat intelligence, reporting, etc.), and each solution’s pros and cons.

Sysdig Secure 2.0 - adds vulnerability management, 200+ compliance checks, and security analytics.

A little over 2 years ago we opensourced Sysdig Falco with the goal of providing a robust detection engine that the community could use to securely run containers in production. Since the launch we expanded the default ruleset and have had 750,000+ downloads of Sysdig Falco. Organizations like cloud.gov and Yahoo have used Falco to detect behavioral anomalies across their containerized infrastructure.

The Force Awakens: PagerDuty + Datadog for DevSecOps

As a long-time security professional, I’m always interested to hear about how companies like Datadog are keeping up with the changing security landscape. I can recall when the security organization was solely responsible for security, and we were focused on protecting the perimeter of our business. However, with the advent of the cloud, mobile, and web applications, that perimeter has disappeared.

Five worthy reads: Does your security operations center really make you immune to cyberattacks?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.

Adopting a SIEM solution, Part 1: Why choose SIEM?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.

Magento Security Scanner

If WordPress and Joomla! rule the CMS World, then Magento is king of the eCommerce platforms. Which makes it the obvious addition to our powerful external Vulnerability Scanning service. We can now detect and notify you of any existing or breaking security issues with the core version of your Magento platform. In addition to in-depth checks for thousands of known software and configuration vulnerabilities for all major software products (e.g. PHP, Apache2, etc.) and operating systems (e.g.

Is global expansion crippling your hold on network security?

Globalization and foreign investments have completely changed the way enterprises are run today. Enterprises are expanding geographically to diversify their risk portfolio, but this expansion hasn’t been linear. From mergers to buyouts, today’s enterprises have endless possibilities, which translates into inorganic, exponential growth—something that’s become the industry norm.

Why Your Client's Firewall May Not Be Up to the Task of Network Security

In this edition of News That Makes the Channel Cringe, a new Sophos report reveals IT pros can’t identify almost half (45%) of the traffic flowing through their networks. The Dirty Secrets of Network Firewalls study, which included the responses of 2,700 mid-size business IT leaders, goes on to say 25% can’t identify over 70% of total network traffic. That’s a massive blind spot, especially with mounting concerns over cybersecurity. The network is what keeps your clients connected.