Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries

Part three of a four-part series covering Ivanti’s latest research. Get the full series: An organization’s culture and training programs have a significant influence on security preparedness, but our research shows both are inconsistent at the country-to-country level. As we’ve seen in the previous posts in this series, employee demographics and their willingness to report security risks are hidden threats to your cybersecurity posture.

Best practices for creating custom detection rules with Datadog Cloud SIEM

In Part 1 of this series, we talked about some challenges with building sufficient coverage for detecting security threats. We also discussed how telemetry sources like logs are invaluable for detecting potential threats to your environment because they provide crucial details about who is accessing service resources, why they are accessing them, and whether any changes have been made.

SSO is now available

We now support SSO (single-sign on), offering an improved login experience for our customers. SSO can be enabled on our website. We want our customers to have a great experience when using our products and part of that is an easy sign-in experience for users. Enabling SSO will remove the need for users to use their Redgate ID and password when signing into the customer portal and compatible products.

Top DevOps Experts offer Key Insights at swampUP

With five keynotes and 15 breakout sessions in one day, there was no shortage of important industry knowledge and key insights from this year’s JFrog swampUP DevOps and DevSecOps user conference. Presenters discussed the role of DevOps at Netflix, how Fidelity migrated to the Cloud, the trend of shifting further left than left, and more. In this post we highlight the three presentations below that challenged attendees to rethink the status quo and reassess their own DevOps and security practices.

Double Down on Your Backups

In August, a ransomware attack hit another company. Unfortunately, it hit a regional cloud provider in Europe this time, and we can call this a “critical hit.” So far, we know a virtual server got compromised and used as a jump host; from there, the attacker started to encrypt all volumes in the same domain. Based on pure luck or some profound reconnaissance, the same server migrated into a different data center and continued its unplanned job from there.

Fighting the Good Fight for a Resilient Digital Future

This Cybersecurity Awareness Month, cybercriminals have far too much to celebrate. Attacks are rising in sophistication and brazenness, and no company or organization is immune. We could panic. Or we could lock arms, fight the good fight and put customers first. I vote for the latter.

Small Business Cybersecurity: Uncovering the Vulnerabilities That Make Them Prime Targets

According to a 2021 report by Verizon, almost half of all cyberattacks target businesses with under 1,000 employees. This figure is steadily rising as small businesses seem to be an easy target for cybercriminals. 61% of SMBs (small and medium-sized businesses) were targeted in 2021. But why are small businesses highly vulnerable to cyberattacks? We are looking into where the vulnerabilities are and what small businesses can do to protect themselves.

Leaky Apps - How Banning Them Builds App Security

Banning apps is sometimes necessary to protect your organization from malicious or misused applications. In particular, leaky apps can be a significant threat, and identifying and banning them is an essential app security measure. Some organizations choose a more flexible approach by allowing employees to use unsanctioned apps and monitor their usage for suspicious activity. Yet others don’t monitor employee app use at all, which is the riskiest approach imaginable.