Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introducing container observability with eBPF and Sysdig.

Today we’ve announced that we’ve officially added eBPF instrumentation to extend container observability with Sysdig monitoring, security and forensics solutions. eBPF – extended Berkeley Packet Filter – is a Linux-native in-kernel virtual machine that enables secure, low-overhead tracing for application performance and event observability and analysis.

Browser vulnerabilities: Securing against the inevitable

Web browsers have revolutionized the way we use the internet. They’ve escalated employee productivity, but have also opened up organizations to a plethora of security loopholes. Browsers are the easiest point of entry for hackers to exploit a system because they contain vulnerable components like plug-ins and cookies.

Three Ways to Secure Kubernetes From Inside Threats

Inherently, Kubernetes clusters are multi-user. As a result, organizations want to ensure that cross-communication is protected via role-based access control, logical isolation and network policies. A container orchestration system such as Kubernetes brings information technology operations and developers (DevOps) closer together, making it easier for teams to collaborate effectively and efficiently with each other.

How to Strengthen Security on Windows 10 Networks

The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It’s debatable exactly how bad the OS actually is or isn’t in this regard. In this article, we’ll be exploring some methodologies and best practices for hardening the security status of your Windows 10 workstations and network configuration.

Website Security: Web Monitoring Tips for Keeping Your Site Safe

With the constant threat of DDoS, DNS attacks, malware, and data breaches; website security is a top priority for today’s tech teams. You’ve taken the appropriate measures. Your domain uses HTTP/S, SSL encryption, and is locked up tight. Or is it? In 2018, Symantec reported over 70 million records were leaked or stolen because of misconfigured S3 buckets.

To Protect and Secure: Selling Cybersecurity as a Service

Auvik AVP of product management Patrick Albert talks with Tayler Feigl, Channel Development Manager, APAC at Datto to discuss key findings in Datto’s annual State of the Channel Ransomware Report, the result of interviewing 100,000 small to mid-sized business (SMBs) around the globe. You’ll hear what your MSP peers are doing to prepare, protect, and recover against ransomware, and investigate how you can use these findings to sell cybersecurity as part of your managed services offering.

Identify risky cloud behavior in your Amazon AWS Cloudtrail logs with CHAOSSEARCH

Trying to make sense of your AWS Cloudtrail logs? Have you given up hope that you'll ever create an Elasticsearch index mapping to search all that data? Watch as Pete Cheslock dives into some AWS Cloudtrail data to identify risky cloud behavior.

Curious about Opsgenie Security? We're Here to Help

When evaluating new software for your business or team many questions may come to mind. How much does it cost? Is it scalable as we grow? Does it fulfill all of our requirements? Or most importantly, if we introduce this tool into our business, is it secure? Perhaps you’re new to Opsgenie and the functionality is exactly what you need but security is a concern.