Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Two-factor authentication in Pandora FMS

I have been a regular user of Pandora FMS for years and the best I can say about them is that they always have something new to add to my learning. Today, for example, I rediscovered the Two-Factor authentication in Pandora FMS! *And I did it, in part, through this article already published on their blog Although I devote myself to programming (and it is what I like to do the most), I am more of a Web 2.0 person than a Web 3.0 person because I consider that the latter has been abused too much.

Why Use Storage as a Service

Most businesses are moving towards Storage as a Service for their data storage needs, and for good reasons. Storage as a Service (STaaS) is not synonymous with cloud storage, although cloud storage can be part of the model. STaas refers to outsourcing your data storage needs to a third party. You can choose to have the infrastructure on your premises and manage it using your existing IT personnel and resources or have the third-party vendor handle everything offsite. Regardless of your choice, Storage as a Service comes with numerous advantages for your business. Here are a few reasons you should consider STaaS if you haven't yet.

What Is Identity Lifecycle Management?

If you help to manage cloud environments, you’re probably familiar with the concept of identity lifecycle management. Identity lifecycle management helps you keep track of who is allowed to do what within your cloud. But merely understanding identity lifecycle management isn’t enough to administer modern cloud identities effectively. You also need a way to automate identity lifecycle management at massive scale.

Advanced Traffic & Security Analysis in WhatsUp Gold with Progress Flowmon

It’s a simple fact that the more tools an IT team has to use, the less effective they are. That’s why one of the chief values of WhatsUp Gold is putting everything you need to find and fix network issues fast in one simple, easy-to-use application. With that in mind, we’ve simplified advanced network traffic analysis and security threat detection from Progress Flowmon by adding those dashboards to the WhatsUp Gold interface.

Tools for Threat Hunting and IT Service Risk Monitoring

Cybersecurity can often seem intimidating for IT teams. After all, things like “threat hunting,” “red teaming,” and “blue teaming” are not used in IT operations. On the other hand, just because these words are terms of art doesn’t mean that they’re activities you don’t do already. You’re probably already using log data as part of your IT operations incident response.

Using Global Namespaces and Zero-Trust Policies with VMware Tanzu Service Mesh

VMware Tanzu Service Mesh delivers a federated Istio service that brings significant value for enterprise customers beyond the core open source project, improving application security, resiliency, and multi-cloud operations.

5 New Aethon TUG Robot Vulnerabilities Expose Healthcare Facilities to IoMT Hackers

Healthcare providers must be extremely vigilant in their cybersecurity defense posture. After all, vulnerabilities in the Internet of Medical Things (IoMT) cost hospitals nearly $21 billion in 2021. New security discoveries by Ivanti partner Cynerio recently made that statistic personal for many providers. While working with an existing healthcare customer, Cynerio found five zero-day vulnerabilities in Aethon TUG autonomous robots – an IoMT device found in many healthcare facilities.

2022 MITRE ATT&CK Evaluation Results Are In-What You Need to Know

It’s that time of the year again! The MITRE Engenuity ATT&CK evaluation results are in and generating quite the buzz in the industry. And for good reason. The MITRE Engenuity ATT&CK evaluation focuses on a tool’s ability to prevent and detect cyber attacker behaviors. Now in its fourth round of testing, it has become the de-facto standard for how security solutions perform against different advanced cyberattack scenarios.