Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Splunk Everywhere! State and Local Government

State and local governments are looking to embrace new technological innovations so they can deliver on-demand citizen services, extend cyber security and gain real-time situational awareness. Splunk allows these organizations to bridge the operational visibility gap created by siloed machine data, giving users a platform to aggregate and correlate their data for end to end visibility across all of their systems.

Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)

In the past few days, a new vulnerability was disclosed in a widely used component – jQuery File Upload plugin. A change in Apache’s Web Server security setting handling, exposed users of this plugin to an unrestricted file upload flaw. Let’s dig in on how to detect jQuery File Upload vulnerability (CVE-2018-9206) using Falco.

Accelerate Security and PCI Compliance Visibility with New Sumo Logic Apps for Palo Alto Networks

It’s becoming increasingly harder to manage the volume of threats coming into enterprise networks as attackers become more sophisticated, the threat landscape expands and enterprises continue to adopt modern applications at cloud scale.

Splunk Enterprise Security: Event Sequencing

Focus on high fidelity threats to your environment with Event Sequencing in Splunk Enterprise Security and accelerate time to investigate and respond to incidents. To learn more on how an analytics-driven SIEM can address your security challenges, visit the Splunk Enterprise Security product page or read our SIEM Buyer’s Guide.

Using Audit Logs for Security and Compliance

Most software and systems generate audit logs. They are a means to examine what activities have occurred on the system and are typically used for diagnostic performance and error correction. System Administrators, network engineers, developers, and help desk personnel all use this data to aid them in their jobs and maintain system stability. Audit logs have also taken on new importance for cybersecurity and are often the basis of forensic analysis, security analysis, and criminal prosecution.

DevSecOps: Agile Security in the Face of Rapid Change

Security is top of mind for every organization. But with the rapid pace of change that comes with digital transformation, how do organizations keep their products and solutions secure when they are constantly evolving? Learn how a leading organization is using PagerDuty to improve cybersecurity incident response while building security into its products through DevSecOps practices.