Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Role-Based Access Control (RBAC): Security Benefits + RBAC Examples for Automated Access Management

Role-based access control (RBAC) is a way to secure IT systems and networks by limiting access to roles that can be assigned to individuals and groups of users. It makes sense for just about any IT team. After all, not everyone needs access to everything in a system, right? Different roles have different responsibilities, and those responsibilities require access to different things. RBAC makes sure that only the users who need access to certain services and resources have it.

Don't Slow Your Roll: Controlling Your Qradar Data Flow

IBM Qradar is a Security Incident and Event Manager (SIEM) trusted by many organizations to provide threat detection, threat hunting, and alerting capabilities. Qradar SIEM is often integrated with complementary IBM tools or enhanced with extensions to meet the needs of organizations that wish to mitigate their risks.
Sponsored Post

It's Not Black Magic: Malware & Ransomware in Plain English

It was almost exactly 10 years ago in December 2013 that we wrote our first blog post about detecting CryptoLocker, which was the first sophisticated Ransomware attack of its kind back then. BTW, 2013 was the year of the Boston Marathon bombing, Edward Snowden leaking secret NSA information, Syrians fleeing their home country and Nelson Mandela passing away.

Unleashing Growth: The Transformative Power of IoT Software Development for Your Business

In the rapidly evolving landscape of technology, businesses are constantly seeking innovative solutions to gain a competitive edge and foster growth. One such revolutionary technology that has emerged as a game-changer is the Internet of Things (IoT). When harnessed with the right IoT software development, businesses can unlock unprecedented opportunities for efficiency, productivity, and overall expansion. Businesses can leverage the power of IoT with the expertise of Cloud Computing Los Angeles experts.

Aggregate Data in Cribl Stream to Optimize Your SIEM Data and Its Performance

Cribl Stream offers different ways to optimize data, such as: In this blog, I will focus on the Aggregation use case using the Aggregations function and how you can practically use the Aggregations function to format the output in different ways.

Demystifying the Software Bill Of Materials (SBOM) and why everyone's talking about them

Tanzu Developer Advocate and Enlightning host Whitney Lee speaks with Tanzu Solutions Architect, Alex Barbato to unpack the Software Bill of Material (SBOM). SBOMs have gained a lot of attention in the past decade, most recently as a result of a slew of White House Executive Orders on improving cybersecurity and service delivery. Listen in as they discuss the most common use cases for SBOMs, using CVEs for triage and remediation, as well as the Vulnerability Exploitability Exchange (VEX), and much more!

Cloud storage security best practices

Data is like the crown jewels of any organisation, if lost or exposed there could be severe repercussions. Failure to protect against system failure could lead to the loss of business data rendering a business non-functional and ultimately causing it’s failure. Exposing sensitive data to unauthorised parties not only leads to reputational damage, but can also cause businesses to incur massive fines.

The Crucial Role of Microsegmentation in 2024: Enhancing Cybersecurity in a Hybrid World

In the ever-evolving landscape of cybersecurity, the year 2024 presents unprecedented challenges and opportunities. As organizations continue to embrace digital transformation, the need for robust security measures has never been more critical. New and emerging threats posed by Generative AI, Unsecured API integrations, agile cloud environments, and easy access to sophisticated nefarious code creation are driving the increase in the frequency, volume, and success rate for cybercriminals.

Top 8 IT Department Issues in 2024

From the proliferation of artificial intelligence and machine learning to an unpredictable economic and geopolitical landscape, 2023 was an eventful year. The top IT department issues have become even more diverse and complex. In 2024, businesses will need to address IT infrastructure and disaster recovery, cybersecurity threats, data privacy policies, and the effects of AI and automation on their industries to stay ahead of the curve.