Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Preventing malicious use of Weave Scope

Intezer and Microsoft reported on Sept. 9 that TeamTNT hackers are deploying Weave Scope in compromised systems as an auxiliary tool in their intrusions. Weave Scope is a legitimate and powerful tool to manage server infrastructure that, once deployed, makes it easy to control all resources. In this article, we will describe how this tool can be used maliciously, and how to add specific checks in your security set up to look for it.

Getting Up and Running with Calico for Windows

Calico is the only cross-platform CNI and networking and network security policy engine available today. It currently powers more than 150,000 known clusters across millions of nodes worldwide. Calico is also unique in supporting multiple dataplanes: Standard Linux, eBPF, and Windows HNS. Many organizations have .NET and Windows workloads that they have or eventually will modernize and deploy to Kubernetes. However, this may be uncharted territory for teams that are using Windows. This session is intended to inform and ease your adoption of Kubernetes on the Windows platform.

See and Secure containers on AWS Fargate

Tune into our #LinkedInLive event on December 9 from 11:30am-12pm PST and join Sysdig and Amazon Web Services (AWS) experts, Pawan Shankar and Eric Carter, to learn how to scan #AWS #Fargate containers in under 4 minutes with Sysdig Secure. Join this live discussion to learn how Sysdig Secure closes the visibility and security gap by providing the first automated #Fargate inline scanning.

New SAML Group Mapping Support

In July, we rolled out SolarWinds® Papertrail™ support for SAML v2.0. SAML authentication allows you to log into your Active Directory® domain or intranet and have immediate access to Papertrail, with no additional login required. Today we’re extending Papertrail SAML 2.0 support to include group mapping. Group mapping allows you to define organization and product roles, and grant access to logs and billings plans, by adding an account to an identify provider group.

How to Ensure Your Website is Secure and Trustworthy

How is your website showing your customers that you care? You are selling a great product and making some good money, but what are you doing in return to assure your customers that all their payment and private data is protected? If you haven't thought about that before, now is the time because a significant data breach could mean the end of your company.

Monitoring Endpoint Security States with InfluxDB

Several factors in recent years have increased endpoint vulnerability — from organizations’ need to make access to data more fluid, to threats targeting mobile device access and networks, to the growing work-from-home and work-on-the-go trends. Endpoints connected to a network — including remote devices, IoT devices, workstations, tablets, laptops and servers — create attack paths for security threats.

The Value of Operationalizing MITRE ATT&CK According to Splunk With Guest Speaker From IDC

The global pandemic has fueled a rapid digital transformation — and led to permanent shifts in cybersecurity. In a recent joint webinar with Bryan McAninch, senior solutions engineer at Splunk, and guest speaker Chris Kissel from IDC, "Sp(e)lunking Security with MITRE ATT&CK® featuring IDC Research," they shared seven overarching trends in cybersecurity for 2021. One notable, but foundational, trend mentioned was the need to understand risk.

Create a New Integration in Opsgenie

Opsgenie is a powerful alert management service that allows you to flexibly set up teams for different alerting groups. Our development team have been working hard to deliver new features and integrations, and now you are able to integrate Opsgenie with RapidSpike to help with your website monitoring.