Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Artificial Intelligence and Machine Learning Play a Role in Endpoint Security

ML-enhanced endpoint protection can keep schools safe from cyberattacks. Here are three benefits district leaders will find when investing in this advanced technology. Long before the pandemic, K–12 cyberattacks were a serious concern. The shift to remote learning has only increased the danger.

Cyber Security Protocols Your Online Business Needs

According to a recent report by CNBC, only 14% of businesses have adequate safeguards against potential cyberattacks. The finding is alarming considering that businesses of all sizes lose close to $200,000 annually due to cyber-related attacks. Ensuring that you have in place water-tight cybersecurity protocols for your online business is a security measure you cannot overlook.

Cybersecurity Awareness Month - It's Not Just for October: Reminders that Deserve Year-Round Attention!

Since 2003, with the sponsorship of the U.S. Department of Homeland Security (DHS), October has been recognized as National Cyber Security Awareness Month. As with other important issues that have “designated months,” like Bullying Prevention Month and Domestic Violence Awareness Month (both also recognized in October), these are issues that deserve year-round attention, not limited to 31 days in October.

Top DevSecOps Tools For 2022

DevSecOps combines the responsibilities of development, security and operations in order to make everyone accountable for security in line with the ongoing activities conducted by development and operations teams. DevSecOps tools serve to assist the user in minimising risk as part of the development process and also support security teams by allowing them to observe the security implications of code in production.

Working with external data, a look at classfiltercsv()

When working with CFEngine, it’s common to hear advice about separating data from policy. Separating data from policy allows for separation of concerns, delegation of responsibilities and integration with other tooling. Each organization is different, and a strategy that works well in one environment may not work as well in a similar environment of another organization, so CFEngine looks to provide various generic ways to leverage external data.

DNS filtering: What is it and why do companies use it?

The Domain Name System (DNS) makes it possible for users to access websites using domain names, like wikipedia.org, in place of nine-digit IP addresses. Due to its ubiquitous nature, DNS can be used to block access to selected websites, which is commonly known as DNS filtering. Many companies see security and productivity benefits from implementing this strategy where appropriate. Read on as we explore some of the key details around how DNS filtering works and how it can be beneficial.

Configuring Kibana for OAuth

Kibana is the most popular open-source analytics and visualization platform designed to offer faster and better insights into your data. It is a visual interface tool that allows you to explore, visualize, and build a dashboard over the log data massed in Elasticsearch clusters. An Elasticsearch cluster contains many moving parts. These clusters need modern authentication mechanisms and they require security controls to be configured to prevent unauthorized access.

Modernizing Your IT Operations with a Secure Foundation

This is the first of a four-part security blog series covering why ScienceLogic is listed in the DoDIN APL catalog, what this means for monitoring critical IT infrastructure, and why APL certification is relevant for all organizations. Part one is all about trust and transparency—foundations for a secure platform.

Why cybersecurity should be your top priority as an MSP

The new year is just around the corner, meaning we’ll be ringing in 2022 before we know it. So how did your MSP fair in 2021? Did you achieve the sales and revenue goals you set? Net new customer acquisition continues to be the #1 challenge facing MSPs today. And because most businesses already have an MSP they are using, the struggle is real. So the test becomes, how can I set myself apart?

Workload access control: Securely connecting containers and Kubernetes with the outside world

Containers have changed how applications are developed and deployed, with Kubernetes ascending as the de facto means of orchestrating containers, speeding development, and increasing scalability. Modern application workloads with microservices and containers eventually need to communicate with other applications or services that reside on public or private clouds outside the Kubernetes cluster. However, securely controlling granular access between these environments continues to be a challenge.