Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Understanding Amazon Security Lake: Enhancing Data Security in the Cloud

This year, Amazon Web Services (AWS), a leading cloud services provider, announced a comprehensive security solution called Amazon Security Lake. In this blog post, we will explore what Amazon Security Lake is, how it works, the benefits for organizations, and partners you can leverage alongside it to enhance security analytics and quickly respond to security events. Image source: Amazon.

Why Cyber Resilience Is Foundational to Your SIEM Success

The common failure scenarios that occur in the cybersecurity world are typically assumed to be costs of doing business, but they’re actually more predictable and avoidable than you might imagine. Even if you’ve been lucky enough to avoid failed data sources or backups, a SIEM getting knocked offline, and other cybersecurity attack situations until now — in today’s day and age, they’re still inevitable.

Unpatched Microsoft 0-Day: How to Mitigate CVE-2023-36884 with PowerShell

Microsoft's July 2023 Patch Tuesday updates highlighted several vulnerabilities under active exploitation, including one (or more?) that remains unpatched. Here's what you need to know about CVE-2023-36884, a zero-day vulnerability that attackers are exploiting to gain remote code execution via "specially-crafted" Microsoft Office documents.

HAProxy and Let's Encrypt: Improved Support in acme.sh

TLS certificates are crucial for the secure flow of web traffic, but managing these digital certificates can pose a challenge. Using an ACME-based certificate authority like Let’s Encrypt can automate and simplify the management of issuing these certificates. Certificate management in HAProxy has steadily improved over the years, allowing it to become more flexible and load certificates without restarting.

Work Injury Prevention: Creating a Culture of Safety in the Workplace

In today's fast-paced world, where productivity and efficiency often take center stage, it's crucial not to overlook the well-being of the most valuable asset in any organization: its employees. Work injuries can have a profound impact on individuals and businesses alike, leading to physical pain, emotional distress, and financial setbacks. That's why it's essential to foster a culture of safety in the workplace, where prevention takes precedence overreaction.

Securing Your Network: OpenWrt Firmware for Improved Router Protection

Securing our networks has become a top priority in today's interconnected world. One of the best ways to achieve this is using open-source firmware for routers, such as OpenWrt. OpenWrt is often more secure than stock home router firmware because it receives regular security updates, addressing potential vulnerabilities and emerging threats.

Trusted Types: How we mitigate XSS threats in Grafana 10

Grafana is a rich platform for data visualization, giving you full control over how your data should be visualized. However, this flexibility and freedom comes with some challenges from a security perspective — challenges that need to be solved to protect the data in Grafana. For years, cross-site scripting (XSS) has been among the most common web application security vulnerabilities.

Maximizing Efficiency: 6 Online Services That Can Help Your New Business

As entrepreneurial activity continues to pick up, more and more people are discovering the unique challenges of operating a new business. One especially difficult hurdle is understanding how best to streamline your operations to make them as efficient as possible. Fortunately, several easy-to-use online services can help small business owners drastically improve their efficiency and profitability - at minimal cost! In this blog post, we'll explore six tried-and-true services designed specifically for entrepreneurs looking to maximize productivity while keeping overhead expenses low.