Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Understanding Kubernetes Evicted Pods

What does it mean that Kubernetes Pods are evicted? They are terminated, usually the result of not having enough resources. But why does this happen? Eviction is a process where a Pod assigned to a Node is asked for termination. One of the most common cases in Kubernetes is Preemption, where in order to schedule a new Pod in a Node with limited resources, another Pod needs to be terminated to leave resources to the first one.

Spot PC security and compliance

End user computing is a popular target for malware attacks. Virtual desktops are no exception. As noted in previous posts, Spot PC emphasizes a “security in layers” approach to securing virtual desktop sessions. This includes using Windows 365 and Azure Virtual Desktop (AVD) and their built-in user identity and security management offered by Microsoft Azure Active Directory. Spot PC also enables Defender for Cloud for every managed virtual machine.

Monitoring CrowdSec with Bleemeo

CrowdSec is an open-source software that allows you to detect peers with malicious behaviors and block them from accessing your systems. It benefits from a global community-wide IP reputation database. Attckers can then be prevented from accessing your resources by deploying bouncers. They are in charge of acting upon actors that triggered alerts: they can block the attacking IP, serve a 403 Forbidden response, and much more.

Benefits of Distributed Computing Systems to the Modern-Day Tech Businesses

The concept of distributed computing systems is relatively new. However, it has already gained immense popularity among modern-day tech businesses. This popularity is because distributed computing systems are easy to implement and offer a range of benefits that can help any business. This article will help to understand why they make sense for your business.

Torq Delivers on the Promise of Parallel Execution

Security operations professionals are constantly being pushed to the edge of their capacities. They’re dealing with endless manual processes and managing tasks sequentially, because of the limitations of their security tools and options. They’ve dreamed of being able to execute more tasks simultaneously to quickly enrich, analyze, contain, and resolve security threats. Today, Torq is proud to introduce Parallel Execution, which makes those capabilities a reality.

InvGate Obtains SOC 2 Certification: What it Means for You

We're happy to announce that InvGate has recently obtained SOC 2 certification, reinforcing our commitment to data security and compliance. SOC 2 is a rigorous security standard that examines an organization's control objectives and tests how well they are implemented. Developed by the American Institute of Certified Public Accountants (AICPA), it consists of a third-party audit that evaluates how companies around the world handle data privacy.

Cybersecurity Insurance Trends: Key Takeaways for MSPs

The increasing frequency and severity of ransomware attacks are driving significant changes in the cyber insurance market. The May 2021 attack on Colonial Pipeline Co. showed—or rather, confirmed—just how vicious and financially damaging these events can be. Unsurprisingly, cyber security insurers are taking steps to limit their exposure to losses from cyberattacks.