Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What Your Kubernetes Security Checklist Might Be Missing

New technologies often require changes in security practices. What is remarkable about containers and Kubernetes, is that they also provide the potential for enhancing and improve existing security practices. In this post, I will share a model that we use at Nirmata to help customers understand security concerns and plan Kubernetes implementations that are secure.

Sponsored Post

EventSentry v4.0 - Introducing ADMonitor

Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.

Fantastic Data Breaches and How to Prevent Them Event

Named in the top 10 world’s most dangerous people alongside Trump & Putin, we are all under attack from Magecart. They attack websites, digital platforms & e-commerce 3rd party supply chains to steal our data, selling it to the highest bidder on the dark web. Our aim is to increase awareness on Magecart attacks, therefore we’ve created an event for Leeds Digital Festival.

Top 5 Open-Source HIDS Systems

The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot.

Detecting and preventing cgroups escape via SCTP - CVE-2019-3874

This week CVE-2019-3874 was discovered which details a flaw in the Linux kernel where an attacker can circumvent cgroup memory isolation using the SCTP socket buffer. In containerised environments, this has the potential for a container running as root to create a DoS.

How to Look for Suspicious Activities in Windows Servers

Scenario You are running a large production environment with many Windows servers. There are multiple forests in the network and some forests have multiple domain controllers. Your Windows server security is paramount – you want to track and audit suspicious activities and view detailed Windows reports extracted from the Windows servers event logs.