Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Automatic Vulnerability Remediation in Java Dependencies: A New Standard for DevSecOps

In enterprise Java applications, every vulnerability in a third-party library can have serious consequences - from data breaches to business process disruption. Traditionally, remediation could take weeks, leaving organizations exposed to risk during that time.
Sponsored Post

How MDR Services Can Optimize Threat Intelligence

Managed Detection and Response (MDR) services play a critical role in cybersecurity. These technologies remotely monitor, detect, and respond to threats, blending threat intelligence with human expertise to hunt down and neutralize potential risks. However, one of the biggest challenges MDRs face is managing the sheer volume and variety of threat intelligence data they receive. This data comes from internal resources and the numerous security technologies their customers use, making it difficult to create a cohesive picture of the threat landscape.

Avoiding the Costs of a Cyberattack | Security Insights Ep. 42

Avoiding the Costs of a Cyberattack | Security Insights Ep. 42 Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) to cover the dreaded costs of a cyberattack, and how organizations can work to proactively avoid them by addressing three strategic imperatives: attack surface, vulnerability prioritization, and data silos. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

What is Linux Patch Management? Overview & Best Practices

In this article, you will learn more about what is Linux Patch Management, its importance, common challenges, key components, tools, and effective strategies. Managing patches is necessary to maintain a secure, stable and high-performing Linux environment. Whether you’re a systems administrator, IT manager, or responsible for keeping Linux systems running smoothly, mastering the process of identifying, testing, and deploying patches plays an important role in safeguarding your infrastructure.

HIPAA Compliance 101: Securing Patient Data with DevOps

In healthcare, protecting patient data isn’t just a requirement—it’s essential. As a tech lead or DevOps professional, understanding HIPAA compliance is crucial. This guide breaks down the essentials and shows how DevOps practices can streamline the process.

Feature Friday #25: Unprivileged execution

Generally, cf-agent runs as a privileged user. But did you know that you can also run as an unprivileged user? A major benefit of running cf-agent unprivileged is the ability to prototype policies during development. However, attempting to execute cf-agent as an unprivileged user without proper configuration will result in errors.

How to Get Started with a Security Data Lake

Modern SecOps teams use Security Information and Event Management (SIEM) software to aggregate security logs, detect anomalies, hunt for threats, and enable rapid incident response. While SIEMs enable accurate, near real-time detection of threats, today's SIEM solutions were never designed to handle the volume of security data organizations generate daily. As daily log ingestion grows, so do the costs of data management.

Beyond the Blue Screen: Insights from the Microsoft-CrowdStrike Incident

In the wake of the Microsoft-CrowdStrike incident on July 19, 2024, Squadcast community has been actively reflecting on the lessons learned from this disruptive event. This global outage, affecting 8.5 million Windows machines, has served as a critical case study for incident management and operational resilience.

STIG hardening on Ubuntu 22.04 with Ubuntu Security Guide

In this webinar, Henry Coggill will showcase USG (the Ubuntu Security Guide) and demonstrate how it can automate compliance requirements. We will discuss the hardening profiles that are available, including DISA-STIG and CIS benchmarks, then cover setting up and configuring the tool and demonstrate the configuration options that you can make for maximum security and coverage of the STIG rules.