Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Leveraging Tines and Cribl Search for Security Automation

At Cribl, we have the privilege of helping our customers achieve their strategic data goals by giving them visibility and control over all of their observability data. The reality today is that data is commonly stored across many places. Whether intentional (such as using Cribl Stream to create a security data lake) or unintentional (because of silos and tool sprawl), organizations desire the ability to access and analyze all of this information at any time.

Why Every Business Needs a Technology-Driven Protection Plan

When you are running a company, you are not solely obligated to take care of your employees, but your consumers too. At the end of the day, there's no need to remind you that it's highly likely that your business holds a bunch of confidential, and relevant information. This is the case with both smaller and larger firms. And if something bad happens to them, you'll be held responsible. That's why today we decided to focus on the importance of data protection and why it would be advisable to implement it. So let's dive into it!

The red team: ServiceNow's first line of defense

If you ask any ServiceNow employee about their role, they'll likely tell you their job and team are the best they’ve ever had. One small but mighty team proclaims this proudly: the red team, a group of professional hackers. As vigilant guardians of the company, the six-person team is tasked with testing the security of our systems and identifying cyber risks, data vulnerabilities, and security threats.

Ensuring Data Security in the Digital Age: A Legal Perspective

Recent years have witnessed dramatic transformations in the legal field due to technology's pervasive influence. While these technological advancements have greatly improved efficiency and accessibility in legal practice, they've also introduced a pressing concern-data security. In this article, we'll investigate the crucial importance of data security to legal professionals, exploring why protecting client information is both an ethical obligation and a fundamental need of law firms.

How do you measure software security maturity?

Scorecards are a Cortex feature that allow you to understand how well your services are doing on the metrics you care about. Scorecards are customizable to your needs, however several are common to most organizations. In our previous post, we shared the top three scorecards that we recommend to Cortex customers. Security maturity is one of the first scorecards we recommend organizations create.

Vendor Risk Management 101-The Imminent Threat of IoT Litter Boxes | Ep.32 Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

SASE Monitoring: How to Monitor & Optimize A SASE Architecture

We've all heard the buzz about SASE (Secure Access Service Edge) and how it's revolutionizing the way we handle network security and connectivity. But let's face it, keeping your SASE architecture running like a well-oiled machine isn't a walk in the park. It's more like a continuous sprint, with multiple moving parts, countless devices, and the never-ending quest for optimal performance. Today, we're delving into the art and science of SASE monitoring.

How to Transform the Way Your Company Manages Its IT Infrastructure

In today's competitive business world, your company cannot afford to waste time or money when it comes to managing its IT infrastructure. Staying ahead of the curve and ensuring efficiency is key for any organization that wants to see success in the long run. If you're looking to revolutionize how your company manages its IT operations, here are some tips on transforming your tech stack and making sure every department runs like a well-oiled machine.