Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Simplifying security auditing, Part 4: Securing web servers

Web servers are front-end facing applications that are vital for the daily operations of businesses. They are subject to attacks such as SQL injection, malicious URL requests, and the age-old classic, denial of service (DoS) attacks. While there are specialized web application security solutions that you can (and should) deploy, auditing web server logs is just as important for ensuring your web servers are secure and always up and running.

Restricting CFEngine to one CPU core using Systemd

In some performance critical situations, it makes sense to limit management software to a single CPU (core). We can do this using systemd and cgroups. CFEngine already provides systemd units on relevant platforms, we just need to tweak them. I’m using CFEngine Enterprise 3.12 on CentOS 7, but the steps should be very similar on other platforms/versions.

Simplifying security auditing, Part 3: Keeping insider threats in check

Insider threats are on the rise. In fact, both administrators and average employees are among the biggest security threats in an organization. When it comes to security auditing, there are two areas you need to focus on: Active Directory changes and individual user activity, particularly administrator activity.

Security Best Practices: Lessons Learned at a High-Growth Startup

Over the past few years, cybersecurity has become an integral part of operating an organization. Yet there are still plenty of small businesses that know very little about security or where to start. Most think they can get away without paying too much attention to security since they’re not a big target and they don’t have much that is worth stealing.

Completing IT Security With Critical Alerting

Businesses and organizations shouldn’t simply rely on monitoring tools for security management. Such tools don’t provide redundancies, time-stamped audit trails and other elements needed for incident resolution. Also, security threats are rampant and tend to go unchecked even with the most reliable monitoring service. That’s why companies require critical alerting to become aware of security incidents and immediately solve them for business continuity.