Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

DNS in the Cloud- Solid or Not?

The Domain Name System (DNS) catalog maps text-based URLs to their specifically-numbered host systems. As the phone book or Yellow Pages of the internet, DNS governs the speed with which websites and online resources may be located, so the speed and robustness of your DNS service can have a profound impact on your internet performance overall.

How to leverage SIEM to meet the GDPR's requirements

Today’s businesses run on data. From getting customer information for payment, processing employee information for payroll, using publicly available data for targeted advertising, to tracking people’s behavior for marketing, data has become the power center of organizations. But with this increased emphasis on data, organizations are now burdened with greater responsibilities.

Amazon EKS monitoring and security with Sysdig.

Amazon Elastic Container Service for Kubernetes (Amazon EKS) provides Kubernetes as a managed service on AWS. It helps make it easier to deploy, manage and scale containerized applications on Kubernetes. Sysdig cloud-native intelligence solutions – Sysdig Monitor, and Sysdig Secure – provide Amazon EKS monitoring and security from a single agent and unified platform. Sysdig helps AWS customers see more, secure more, and save time in troubleshooting deployed microservices.

ManageEngine Extends Its SIEM Solution's Log Management Capabilities to the Cloud

PLEASANTON, Calif. - July 17, 2018 - ManageEngine, the real-time IT management company, today announced that it has extended the log management capabilities of its security information and event management (SIEM) solution, Log360, to the cloud.

Docker image scanning - How to implement open source container security (part 2).

In this article we will cover Docker image scanning with open source container security / image scanning tools. We will explain how to to deploy and setup Docker image scanning: both on private Docker repositories, and as a CI/CD pipeline validation step. We will also explore ways of integrating image scanning with CI/CD tools like Jenkins, Kubernetes runtime configuration features and runtime security tools like Falco.

Runtime container security - How to implement open source container security (part 1).

Container security is top-of-mind for any organization adopting Docker and Kubernetes, and this open source security guide is a comprehensive resource for anyone who wants to learn how to implement a complete open source container security stack for Docker and Kubernetes.

Kubernetes run-time security: Automate Sysdig Falco deployment using Helm charts.

So, you want to implement run-time security in your Kubernetes cluster? If you are looking for an open-source tool, obviously Sysdig Falco is the way to go :). You can install Falco as a daemonSet, but as we wanted to make things even easier and natively integrated, we have packaged Falco as a Helm chart, the Kubernetes package manager.