Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Mastering Cybersecurity: From Integration to Real-World Threats and AI

In this episode of Azure on Air, Nino Crudele dives into the world of cybersecurity, revealing critical insights on safeguarding digital data. Drawing from personal experiences and real-world hacking stories, Nino unpacks how threats like social engineering and the dark web operate. He also explores the role of artificial intelligence, showing both its potential to strengthen and undermine security efforts. This episode is a must-listen for anyone wanting to stay informed about emerging cyber risks and learn best practices for protecting their online presence.

How VirtualMetric significantly reduces SIEM ingest costs

Ever wondered how you can massively reduce SIEM data ingestion costs? In this video, Yusuf walks you through how VirtualMetric makes it happen. We’ve found a way to reduce SIEM ingestion costs by up to 90% using smart data pipelines, real-time data processing, and 99% compression rate for long term storage. If you’re dealing with large amounts of log data and looking for a way to save on costs while improving your cybersecurity operations, this might be what you need!

Understanding the NIST Framework and Recent AI Updates

A lot has changed for the National Institute of Standards and Technology NIST Framework since 2013, when former President Barack Obama signed Executive Order 13636 that directed the Executive Branch to: Since the creation of the NIST framework, we’ve seen an evolution in sophisticated cyberattacks on the rise with new challenges like AI.
Sponsored Post

Innovative Approaches to Ransomware Protection with NetApp Monitoring

Analysis of innovative approaches to ransomware protection using NetApp monitoring tools, with a focus on how these tools enhance data security, ensure system integrity, and provide real-time threat detection and response. This includes examining the integration of advanced security features within NetApp's monitoring framework, leveraging AI-driven analytics to identify and mitigate ransomware threats, and exploring the role of automated responses in safeguarding critical data assets.

Innovator Preview: 2024 Q4 Additions and Enhancements to Ivanti's Security Portfolio

Ivanti Neurons focuses on patch management with recent updates emphasizing continuous remediation and risk-based strategies. New maintenance tracks allow for routine and targeted vulnerability management. The October release enhances deployment options and introduces patch reporting features, including compliance reporting and dynamic configurations for Linux. The Q4 release aims to provide actionable evidence on exposures, linking to potential hacker targets. The session wraps up with thanks and an invitation for future discussions.

10 Tech Hacks That Help Make Life Easier

As it is visible, everyone's life can be easy with the advancement in technology. The portable devices can have cool hardware and clever software. The work environment is made easier with the help of technology, whether it means taking out the repetition from previous work, improving the use of devices such as a smartphone, or changing the structure of a person's place. Here are 10 tech hacks that will not demand much effort or time.

Entra ID Security Monitoring

The whitepaper delves into how effective monitoring of identity access and authentication can enhance security, improve compliance, and mitigate potential threats. By examining key metrics, best practices, and real-time monitoring strategies, this whitepaper demonstrates how Microsoft Entra ID monitoring can proactively safeguard IT infrastructures, detect suspicious activity, and streamline access management for hybrid environments.
Sponsored Post

How to Detect Threats to AI Systems with MITRE ATLAS Framework

Cyber threats against AI systems are on the rise, and today's AI developers need a robust approach to securing AI applications that address the unique vulnerabilities and attack patterns associated with AI systems and ML models deployed in production environments. In this blog, we're taking a closer look at two specific tools that AI developers can use to help detect cyber threats against AI systems.