Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Subdomain takeover: ignore this vulnerability at your peril

The Domain Name System (DNS) is often described as the address book of the Internet. A and AAAA records map a human-friendly hostname like honeybadger.io to some machine-friendly IP address like 104.198.14.52. Other types of DNS records also exist; in particular, CNAME records are records that map a hostname to some other hostname, thereby delegating IP resolution to the latter.

Effortless Data Compliance with Cribl Lake

Organizations generate, collect, and store vast amounts of telemetry data. With this data comes the growing responsibility to ensure compliance with various regulations, from GDPR to HIPPA. Data compliance ensures data is handled, stored, and processed according to laws and standards protecting personal information. But what makes compliance regulations scary is that it’s ever-changing and rules vary across industries, making it complex to manage.

Feature Friday #32: Doing math in policy with eval()

Ever need to do some math during policy evaluation? Sometimes configuration settings are based on available resources. For example, what if you want to calculate the size of shared buffers to be 25% of your available memory? Let’s write some policy. First, we need to figure out how much memory we have. Let’s parse this out from /proc/meminfo: So, we have 65505464 kB of memory in total. Knowing that we can use eval() to calculate what 25% is. eval() can also be used to test truthfulness.

Creating a Secure Cyber Environment | Ubuntu Security Podcast

Software supply chain knowledge is crucial for cybersecurity. It's essential to understand not only what's running but also its provenance and reliability. In episode two of our 3-part Month podcast series, Eduardo Barretto and Luci Stanescu join Alex Murray to discuss some of the best cybersecurity practices for everyone.

Top Reasons Your Business Needs Scalable Data Center Solutions

In today's fast-paced business environment, the demand for flexible and efficient technology solutions is at an all-time high. Companies are increasingly reliant on data to drive their operations and make informed decisions. As data needs grow, businesses face significant challenges in managing their IT infrastructure. Scalable data center solutions offer a way to adapt to these evolving requirements effectively.

AI Cybersecurity Best Practices: Meeting a Double-Edged Challenge

Artificial intelligence is already showing its potential to reshape nearly every aspect of cybersecurity – for good and bad. If anything represents the proverbial double-edged sword, it might be AI: It can act as a formidable tool in creating robust cybersecurity defenses or can dangerously compromise them if weaponized.

Navigating Fraud Prevention and AI in Government Operations

Navigating Fraud Prevention and AI in Government Operations State and local governments are tackling social security and tax fraud challenges, especially in the wake of COVID-19. Identifying fraud in decentralized environments is crucial. Effective device management is key to overseeing global networks, while robust data protection policies ensure the safe handling of sensitive information. AI is revolutionizing operational efficiency, aiding in IT service management and fraud mitigation.

How to Optimize SIEM for Better Cybersecurity and Incident Response

Cybersecurity today is not just about defending against attacks. It’s about proactively managing risks in a landscape where threats are growing in volume and sophistication. With data volumes rising by 30% in just the past year and the average cost of a data breach now exceeding $4 million, traditional Security Information and Event Management (SIEM) systems are no longer enough.

MSP's Guide to Getting Started With Compliance as a Service

In this episode of Beyond the Horizon, Stefanie Hammond steps in to interview Lewis Pope about the critical role of compliance in the managed services provider (MSP) landscape. They discuss how MSPs can pivot to offer Compliance as a Service (CaaS), the importance of internal assessments, and the challenges faced when implementing compliance strategies. Lewis emphasizes the need for MSPs to adapt to changing client demands, manage internal cultural shifts, and consider partnerships to enhance their compliance capabilities.