Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Ep 9: The Power of Lightweight Endpoint Security featuring Zach Wasserman

In this episode, Shon delves into the open-source security realm with Zach Wasserman, CTO of Fleet Device Management. In a world brimming with cyber threats, this episode is a beacon for IT enthusiasts and professionals. Zach shares Fleet's journey from Facebook's corridors to the forefront of endpoint security, and how they balance offering robust open-source tools with a sustainable business model.

Balancing The Benefits Of AI With Individual Privacy Rights

The rise of artificial intelligence (AI) technologies has ushered in a wave of powerful capabilities. From self-driving cars to facial recognition algorithms, AI is everywhere, providing companies and individuals with practical tools for streamlining workflows and improving lives. What's also become increasingly clear is that the expansion of AI can potentially violate individual privacy rights-a cause for concern among consumers and governments alike.

Understanding Zero-Day Vulnerabilities in Software Supply Chain

A Node.js module with nearly two million downloads a week was compromised after the library was injected with malicious code programmed to steal bitcoins in wallet apps. Join us as we delve into a real-world zero-day supply chain attack. Understand the response that followed, and how attacks like this can be mitigated. Learn from David Gonzalez, Principal Engineer at Cloudsmith and Member of the Node.js security working group, as he walks us through the incident.

Kubernetes Security Challenges with Armo - Insights from KubeCon NA 2023 - Civo TV

Ben from Armo and a key maintainer of the Kubescape project shares expert advice on securing Kubernetes in multicloud environments. Dive deep into the challenges and solutions for Kubernetes security, as Ben offers practical tips and strategies.

Analytics Plus webinar: Catch critical signs of vulnerable security protocols

Security is all about addressing every potential vulnerability and creating formidable barriers to deter malicious actors from breaching your sensitive data. Given the multitude of vulnerabilities that need attention, security professionals often find themselves inundated with tasks. It's not just a matter of strengthening your infrastructure; it's about ensuring that every potential entry point is securely sealed to thwart malicious actors' attempts to compromise your infrastructure.

Analytics Plus webinar: How to make the help desk your first line of cyberdefense

When it comes to detecting a cyberattack, machine data such as logs, metrics, and telemetry is all-important. Sifting through mountains of machine data and recognizing threats is one way to secure your organization. But prevention is better than cure, and sticking to the basics and following best practices is the best way to keep threats at bay. Since the help desk holds a record of everything that happens in your IT, connecting help desk operations and events with common gateways helps prevent loopholes from being exploited.

CMMC v2 Compliance with EventSentry

A quick overview on how EventSentry can help organizations become CMMC v2 compliant. EventSentry features actionable dashboards and reports to become and STAY compliant. But EventSentry goes beyond compliance - the monitoring and security features of EventSentry can be leveraged by any compliance framework. The result is a network that's compliance AND secure.

Out-of-band communication: Maintaining business continuity

Today, most organizations rely on several different secure communication mediums — like email, real-time chat, video calls, and SMS — to transmit information, collaborate, and keep teams aligned. While modern communication tools help teams stay connected, the digital landscape is not without its challenges. For most organizations, it’s only a matter of time before network disruptions, security breaches, and system failures impact main lines of communication.