Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

IT in 2018: A ManageEngine retrospective

2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the processor bugs Meltdown and Spectre. From there, the year was filled with data breaches and ransomware. But things weren’t all bad this year; the GDPR went into effect, which is a huge step forward in data privacy, and plenty of new technologies were released.

Cyber Security in the Movies - Is It Realistic?

Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security system.

Integrating Sysdig Secure with Atlassian Bamboo CI/CD

In this blog post we are going to cover how to perform Docker image scanning on Atlassian’s Bamboo CI/CD platform using Sysdig Secure. Container images with security vulnerabilities or not compliant with the security policies that you define within Sysdig Secure will be stopped, breaking the build pipeline before being pushed to your Docker registry.

SecOps Is Getting Real (Time)

Companies migrating to the cloud need to ensure they have a strong security posture and can meet compliance requirements. Along with ensuring compliance, companies also are faced with the challenge of tying together multiple security tools that generate a high volume of event data across disparate interfaces and platforms. To help address this challenge, a new security service was introduced at AWS re:Invent 2018: AWS Security Hub.

Conquer it with correlation-Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.

A Quick Guide to Encrypted Messaging

With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we’re going on holiday and where, and send and receive risqué photos. However, when it became public knowledge that the NSA, internet service providers, and trusted social media platforms were able to monitor our private messages, the choice to share or not to share was taken away from us.

Understanding the Impact of the Kubernetes Security Flaw and Why DevSecOps is the Answer

It finally happened. At the start of DockerCon Europe and a week before KubeCon was set to take place in the U.S., researchers discovered the first major vulnerability within Kubernetes, the popular cloud container orchestration system.