Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How New Mexico State University accelerates compliant federal research with Ubuntu

When the stakes are high and national security is on the line, every decision matters. Just ask the team at New Mexico State University’s Physical Science Laboratory (PSL). Founded back in 1946 to support the United States’ space and rocket programs, PSL has been on the leading edge of defence-oriented applied science for over seven decades. But when the Department of Defense (DoD) rolled out new cybersecurity guidelines, PSL found itself at a crossroads.

How AI Is Challenging Cybersecurity Efforts

Artificial Intelligence (AI) is being used for all kinds of wonderful things, with many industries and businesses embracing the technology with open arms. AI can make short and accurate work of many complex tasks, which is seen favorably by businesses. But for all its good, AI also has a darker side which is becoming more evident with each passing day.

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time

In a previous blog post, I discussed the two main areas to audit before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would: Identify your gaps with the NIS2 directive’s requirements now. Review your current supply chain security flaws. Now that we’ve discovered these security flaws, we must fix them — before time runs out in October 2024.

Your Guide to ACSC Essential 8 Compliance

Shane Wescott and Abdul Azize from Ivanti demonstrate how the Australian Cyber Security Centre (ACSC) experts' Essential 8 recommendations can be applied at your organisation – saving you time and reducing costs and risks. Learn how: To improve your compliance with the Essential 8 controls. To decrease your cost and time to patch. To protect faster and improve your maturity with risk-based threat intelligence.

What are the Benefits of Using Cribl Stream with Amazon Security Lake?

In a recent user group meeting, guest speaker Marc Luescher from Amazon Web Services (AWS) joined us to give an overview of Amazon Security Lake. We talked about Cribl use cases and how Cribl Stream can bring your non-AWS data into the Security Lake. Enterprises are dealing with some significant challenges with security data in 2023. Inconsistent, incomplete, poorly-formatted log data is simultaneously scattered across companies and locked up in different silos within the organization.

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time

You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance. But you might be tempted to think that October 2024 is far away, right? Think twice. After all, how can you know if you have plenty of time to prepare if you don’t know how well you currently comply with the projected regulations?

New Feature: Enhance Security with Status Page SSO

We’ve heard your feedback and it’s here: Status page SSO is now available on our Enterprise plan. Status Page Single Sign-On (SSO) empowers StatusGator customers to safeguard their status pages through a seamless Single Sign-On experience. You can now restrict access to your status page to only your team, employees, or users who have SSO access through your organization’s identity provider.

Blackhat 2023 Recap: How Will Advanced AI Impact Cybersecurity?

Ed Bailey and Jackie McGuire from Cribl will recap Black Hat 2023, focusing on emerging trends in cybersecurity, including the rise of advanced AI. We’ll share insights and anecdotes from our time at the event. Tune into the live stream for an engaging discussion, and come prepared with your thoughts and questions about Black Hat and the future of cybersecurity.

Online Security For Businesses: Threats, Weaknesses, And Solutions

The rapid evolution of technology has brought about immense benefits, but it has also paved the way for sophisticated cybercriminals. These adversaries are constantly devising new methods to exploit vulnerabilities in business IT systems. From ransomware attacks to phishing schemes, the variety and complexity of these threats are escalating. As businesses expand their online presence and rely more on digital platforms, understanding the landscape of cyber threats becomes crucial. It's not just about protection; it's about staying ahead in an ever-changing cyber environment.

How to Utilize Dark Web Monitoring Protection

Odds are, you've heard about the dark web. Nevertheless, you may be unsure about its threat to your business and how to address it. The dark web is a set of anonymously hosted websites within the deep web accessible through anonymizing software, commonly "TOR" (The Onion Router). The anonymity these websites provide makes them the perfect online marketplace for illegal activities.