Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Build a CIS hardened Ubuntu Pro server image on the AWS Console

Learn how to elevate the security of your Ubuntu servers by creating a CIS-hardened Ubuntu Pro AMI using only the AWS web console. Join Canonical Public Cloud Alliance Director Carlos Bravo in this step-by-step tutorial as he walks through the hardening process utilizing the Ubuntu Security Guide (USG) tool to ensure your system's security aligns with industry standards including CIS and DISA-STIG.

Your Secret Weapon Against Cyber Threats: Enhancing Cyber Resiliency With Cribl

In a previous webinar, we discussed the importance of ensuring that your enterprise is cyber resilient and the politics around establishing a thriving cybersecurity practice within your organization. This week’s discussion covers specific tactics and solutions you can implement when you begin this initiative — watch the full webinar replay to learn more about how Cribl supports your cyber resiliency efforts.

Stay One Step Ahead of Cyber Threats with iOPEX's State-of-the-Art Synthetic Monitoring Solution

Exciting News! We are thrilled to share our latest Customer Success story featuring a leading Fortune 500 enterprise. Revolutionary BOTs-driven Synthetic Monitoring solution from iOPEX Technologies transforms network security for a Fortune 500 Cybersecurity and Networking giant. Proactive network surveillance and cutting-edge cybersecurity measures ensure uninterrupted operations, thwarting threats before they strike.

Augmenting behavior-based network detection with signature-based methods

Network detection tools utilize one of two prominent approaches for threat detection: AI-driven behavior-based methods capable of identifying early indicators of compromise, and signature-based ones, which flag known attacks and common CVEs. While these systems operate on distinct principles, their combination forms more robust defense mechanism, helps to consolidate tools, provides richer threat context and improves compliance.

Securing IoMT Devices: Best Practices for Hospitals to Prevent Cyberattacks

The Internet of Medical Things (IoMT) has revolutionized the healthcare industry, connecting medical devices to the internet and allowing for greater patient care. However, with this new technology comes new security threats. Hospitals must be aware of these risks and understand how to find, fix and secure connected medical devices to protect their patients from cyberattacks.

No need for Infosec "Rock stars"

Have they somehow found unlimited budget for their every tech request? Do they have an uncanny ability to source the diamond-in-the-rough talent? Or, is it something else? As part of our inaugural State of Cybersecurity Preparedness research series, Ivanti asked 6,550+ cybersecurity professionals, leaders and end users what their cybersecurity teams will do in the next 12 months to secure their organizations.

Cloud Security - Indiana Bob's Server Closet Versus Data Centers | Ep.28 Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Securing Open Source Dependencies on Public Cloud

Aaron Whitehouse, Senior Director of Public Cloud Enablement at Canonical, explains why you need to be thinking about open source dependencies in your software pipelines. He covers three main areas of software dependency management: ESM is part of Canonical's Ubuntu Pro offering and gives developers access to approximately 30,000 packages that they can build on, confident in the knowledge that Canonical will patch high and critical vulnerabilities for up to 10 years while preserving API stability -- regardless of the upstream project's support lifecycle.

Building a Distributed Security Team

In this live stream, Cjapi’s James Curtis joins me to discuss the challenges of building a distributed global security team. Watch the full video or read on to learn about some hard-won examples of how to be successful with remote team building and management. Talent is hard to find, and companies are hiring from all over the world to build the best teams possible, but this trend has a price.