Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Streamline Incident Analysis in QRadar by Using the Progress Flowmon QRadar Application

Flowmon QRadar integration provides a single pane of glass to detect and respond to Flowmon ADS events directly in IBM QRadar. The integration packages were updated to support the latest version of Flowmon products and the IBM QRadar platform. Security Information and Event Management (SIEM) systems are considered foundational elements in a company's security toolkit.

DNS troubleshooting for Kubernetes applications with Calico DNS dashboards

Within Kubernetes, the Domain Name System (DNS) plays a pivotal role in facilitating service discovery, allowing pods to effectively locate and interact with other services within the cluster. For organizations transitioning their workloads to Kubernetes, establishing connectivity with services external to the cluster is equally important.

Secure Credentials for GitOps Deployments Using the External Secrets Operator and AWS Secrets Manager

The security and storage of secrets is one of the most controversial subjects when it comes to GitOps deployments. Some teams want to go “by the book” and use Git as the storage medium (in an encrypted form of course) while others accept the fact that secrets must be handled in a different way (outside of GitOps). There is no right or wrong answer here and depending on the organization requirements, either solution might be a great fit.

Kosli Achieves SOC 2 Type 2 Compliance: Strengthening Our Commitment to Security

We are thrilled to announce that Kosli has successfully completed a SOC 2 Type 2 audit, demonstrating our commitment to the security, quality, and operational excellence our customers expect. This achievement builds upon our existing SOC 2 Type 1 compliance, further solidifying our dedication to robust security practices.

Demystifying Zero Trust: Why MSPs Need to Take it Seriously

If you’re still relying on VPN servers to protect customers’ infrastructure, you could be leaving them as sitting ducks for cyber-attacks. This may sound like scaremongering, but VPN servers have increasingly come under the spotlight since COVID-19 forced the world to embrace remote working, and then again in 2021 as hackers shutdown the Colonial Oil Pipeline in the U.S. after gaining VPN access. However, VPN is now facing a much larger threat: an extinction event, driven by Zero Trust.

Do You Know How to Securely Consume Open Source?

Open Source Software (OSS) presents boundless opportunities, and organizations face challenges in securely leveraging OSS Join Cloudsmith and Chainguard as we talk about the easy way to securely consume OSS. Discover S2C2F best practices for securely consuming OSS and understand how Cloudsmith's Cloud Native Artifact Management aligns with these standards. Learn about Chainguard zero CVE images drastically reduce vulnerabilities and image attack surface.

How to Monitor SASE Networks: From Cloud to Endpoint

In modern connectivity, the advent of Secure Access Service Edge (SASE) has ushered in a new era of network architecture. But most network admins and IT pros understand the critical importance of not just adopting SASE but ensuring its continuous, secure, and optimized operation. In this blog post, we’ll explore the ins and outs of monitoring SASE networks —a crucial aspect that separates a robust, responsive infrastructure from potential bottlenecks and performance issues.
Sponsored Post

Analyzing SASE DEM Solutions

Vendors across security sectors are now offering their own digital experience monitoring products, especially when the security products can impact customer networks and performance at various levels. While these monitoring tools can provide valuable information to customers, it raises concerns about whether there is a potential conflict of interest between the vendor and the customer. If the SASE platform or security tools are introducing latency and slowing response times, how can the monitoring tools be trusted to accurately reflect their overhead?

How Human Error Relates to Cybersecurity Risks

In the digital age, the threat of cybersecurity breaches looms larger than ever. Inadvertent actions, such as clicking on phishing links, falling victim to social engineering tactics, using weak passwords, or neglecting essential security practices, contribute significantly to cybersecurity risks. These actions create openings for cybercriminals to exploit, leading to unauthorized access and data breaches.