Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Navigating Cookies at Sentry: A Legal Perspective

You may have noticed that the banners asking you to accept “cookies” whenever you visit a website have gotten bigger and more annoying over time, especially if you browse the internet in Europe. This is in response to laws and regulations that are meant to protect users from being tracked unless they agree to be tracked. The requirement in Europe is that if you want to use cookies, subject to a few narrow exceptions, the purposes must be disclosed with granularity and agreed to in detail.

Invisible Armor: Cycle's Behind-the-Scenes Update Guards Against Recent "Leaky Vessels" Container Exploit

At Cycle, we understand the paramount importance of security and the challenges that come with maintaining it. That's why we're proud to share how our proactive approach has not only addressed the recent “Leaky Vessels” container exploit, but has done so in a manner entirely transparent to our customers, and in under 4 hours of the vulnerability being made public.

A Step-by-Step Guide to Conducting a Website Security Audit

In the modern world, few things are as important for a business as its website. That's because websites are the main interface through which customers tend to interact with your brand and the main location at which customers make orders. For other types of business, websites are the primary point of communication between clients and employees. That huge level of importance brings with it a huge sense of vulnerability.

What is SAML and How Does It Work?

Web authentication is a vital cornerstone of online security and trust in the ever-evolving digital landscape. This process, pivotal in verifying the identity of users accessing various digital services – from cloud applications to online platforms, has grown increasingly crucial. As organizations transition to digital operations, their potential attack surface expands, statistically heightening their susceptibility to a spectrum of cyber threats.

Major Hospital System Cuts Azure Sentinel Costs by Over 50% with Observo.ai

A large North American hospital system saw rapid increases in its Microsoft Azure Sentinel SIEM expenses primarily due to the escalating growth of security telemetry data. Their primary data sources were Fortinet Firewall logs, Windows Event Logs, Active Directory, Domain Controller, and DNS logs.

Announcing the Mattermost Trustcenter

Our mission is to make the world safer and more productive by developing and delivering secure, open source collaboration software. And that mission starts with ensuring that our customers can make informed decisions about their software choices. That’s why we’re excited to introduce the Mattermost Trustcenter.

Securing the Future: The Critical Role of Endpoint Telemetry in Cybersecurity

As IT managers and security practitioners navigate the complex terrain of modern cybersecurity in 2024 and beyond, the importance of endpoint telemetry cannot be overstated. This sophisticated technology involves meticulously gathering and analyzing data from various network endpoints, such as personal computers, mobile devices, and the ever-growing network of IoT devices.