Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Custom Headers on our WebHooks Integration

Exciting news! We have recently updated our Webhooks integration to allow custom headers in order to integrate with third party alarming tools. This update makes our webhooks integration more powerful and adaptable. The Webhook integration allows you to get RapidSpike notifications in your applications, and custom headers lets us send extra data along with the Webhook, which some third parties may require.

Five Steps to Developing an Application Modernization Strategy

Supporting legacy applications is problematic for several reasons. These aging systems are becoming increasingly obsolete and difficult to maintain. They use outdated software languages and unsupported hardware parts—some as much as 50 years old. As they age, they introduce cybersecurity risk and are less effective at accomplishing their intended purpose. While achieving application modernization isn’t without its challenges, the benefits are considerable.

SIEM Tutorial: What should a good SIEM Provider do for you?

Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together for a comprehensive view of IT security. This can be tricky, so we’ve put together a simple SIEM tutorial to help you understand what a great SIEM provider will do for you. A SIEM’s responsibility is to collect, store, analyze, investigate and report on log and other data for incident response, forensics and regulatory compliance purposes.

Detecting Ryuk Using Splunk Attack Range

Cybersecurity Infrastructure Security Agency (CISA) released Alert (AA20-302A) on October 28th called “Ransomware Activity Targeting the Healthcare and Public Health Sector.” This alert details TTPs associated with ongoing and possible imminent attacks against the Healthcare sector, and is a joint advisory in coordination with other U.S. Government agencies.

Ryuk and Splunk Detections

Several weeks ago, my good friend Katie Nickels (Director of Intelligence at Red Canary extraordinaire) and I were chatting about Ransomware. She was super interested and passionate about some new uses of a ransomware variant named “Ryuk” (first detected in 2018 and named after a manga/anime character) [1]. I was, to be honest, much less interested. It turns out, as usual, Katie was right; this was a big deal (although as you will see, I’m right too… still dull stuff!).

Why People, Processes, and Technology Cannot Change in Isolation

Since 2004, October has been designated by the National Cybersecurity Alliance as National Cybersecurity Awareness Month (NCSAM). Immediately, the mind wanders to supercomputers creating unbreakable algorithms against adversaries with unlimited compute power. This virtual landscape is happening today, and the arms race on both sides is something we’ll have to grapple with for the foreseeable future.

Triaging Log Management Through SIEMS

While all cybersecurity professionals agree that log management is integral for robust proactive and reactive security, managing the enormous amount of data logs can be a challenge. While you might be tempted to collect all logs generated from your systems, software, network devices, and users, this “fear of missing out” on an important notification ultimately leads to so much noise that your security analysts and threat hunters cannot find the most important information.

Is IT security under attack?

From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake of the COVID-19 pandemic, companies around the world are reporting more cyberattacks than ever before, and although the techniques used or the method of attack may be new, the vectors of attack over the years remain unchanged.

What Are the Pros and Cons of File Sharing?

File sharing is a method used by some organizations where multiple employees have access to the same files. How the files are accessed does vary depending on the user environment. The files could be shared between two computers, where the files are stored on one computer and another user accesses them from their workstation. The files might be stored on a network file server instead of on a local workstation.