Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Are your applications secured end-to-end?

Kubernetes has grown immensely, and its use within organizations is maturing. While Kubernetes’ growth is exciting, security concerns around applications deployed on Kubernetes are mounting. Red Hat performed a survey with hundreds of DevOps professionals, and it showed that 55% delayed application releases due to security issues.

How to Leverage Cribl and Exabeam: Parser Validating

Organizations leverage many different cybersecurity and observability tools for different departments. It’s common to see the IT department using Splunk Enterprise, while the SOC uses Exabeam. Both of these tools use separate agents, each feeding different data to their destinations. Normally this isn’t a problem unless you’re talking about domain controllers. Domain controllers only allow a single agent, meaning you can’t feed two platforms with data.

Key considerations before signing up for cyber insurance

With 2021 seeing 5.1 billion records breached and an annual increase in attacks at 11%, the risk of security incidents is only getting greater every year. And when an attack hits, the cost to recover, which includes fines, penalties, legal fees, and much more, are also great. To help minimize the scope of financial damage, many organizations turn to cyber insurance. Albeit a relatively new branch of insurance, demand is already huge and ever increasing.

How To Secure Your Business Digitally?

If there is one thing you should never handle with levity over your company, then it has to be your data security. There is a consistent record of data breaches occurring every day. And a Risk-based Security report claims data breaches exposed 22 billion records in 2021! That's a massive blow to the confidentiality of private and sensitive records! And the type of crimes these data thefts can be used to perpetrate is even costlier on companies and their customers.

How Chatbot Automation Benefits Security Teams

When you hear the term “chatbot,” your mind may at first turn to things like robotic customer support services on retail websites – a relatively mundane use case for chatbots, and one that is probably hard to get excited about if you’re a security engineer. But, the fact is that chatbots can do much more than provide customer support.

Processes, forks and executions - part 2

This is the second blog post in a short series about processes on UNIX-like systems. It is a followup to the previous post which focused on basic definitions, creation of processes and relations between them. This time we analyze the semantics of two closely related system calls that play major roles in process creation and program execution.

How Organizations Can Mitigate Human Operator Error & Increase Security

Human error is inevitable. It's something that happens to everyone, even the most experienced and careful individuals. And while some errors may be harmless, others can have catastrophic consequences - especially in the workplace. That's why it's so important for organizations to take steps to mitigate human error and increase security. By doing so, they can protect their employees, facilities, and assets from harm. There are a number of ways organizations can mitigate human error and increase security.