Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The Data Explosion and its Effect on Security

Data is exploding. The shift to digital business is driving a massive expansion in the volume of data that organizations produce, use, and store. It is also accelerating the velocity of data—that is, the data is changing more rapidly than ever before. Which in many ways is great—more data can bring more insight into customers, markets, and opportunities. But more data can also be a problem.

EventSentry SysAdmin Tools: Digital Signature Verification with checksum.exe

Windows supports a code-signing feature called Authenticode, which allows a software publisher to digitally sign executable files (e.g. .exe, .msi, …) so that users can verify their autenticity. The digital signature of a file can be viewed in the file properties in Windows explorer on the “Digital Signature” tab.

Status.io and GDPR

We’re just a few months away from mandatory compliance with GDPR. The European General Data Protection Regulation (GDPR) replaces the EU National Data Protection legislation and is due to take effect in May 2018. The GDPR is a new regulation to protect personal data of EU citizens. It affects all organizations (even outside of the EU) that process data of EU citizens. In our previous article “Preparing for the GDPR”, we shared some resources for learning more about the GDPR.

Vulnerability Scanning with RapidSpike

The latest addition to the ever growing Security Monitoring tools from RapidSpike is the ability to perform Vulnerability Scans of your external facing servers and web applications. Cyber Security is a massive area of concern for every website or web application owner and ensuring that your applications and servers are free from vulnerabilities is critical in ensuring the ongoing availability of your service.

Five worthy reads: Machine learning, the next phase of cybersecurity

With the number of cyberattacks growing with each passing day, the need for increasingly sophisticated security systems has never been higher. Just when these ceaseless attacks had you at your wit’s end, machine learning may just restore some sanity to the cybersecurity scene.

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.