Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Why Observability is Critical to Cyber Resilience

Whether an enterprise operates in technology, healthcare, financial services, or another business vertical, cybersecurity must remain top of mind. In addition to the numerous international cybersecurity regulations, like the NIST Cybersecurity Framework, GDPR, and other mandates, enterprises must also prioritize cybersecurity to mitigate downtime, protect sensitive data, and uphold customer trust and brand reputation.

What Is AES Encryption: Advanced Encryption Standard Explained

AES (Advanced Encryption Standard) encryption is the current cryptographic standard used and promoted by the US government for securing sensitive data. It is used widely in cybersecurity, protecting IT infrastructures, and securing communications. This guide explains what AES encryption is, how it works, and where it is used. It also explains its importance in cybersecurity and in securing valuable data.

Feature Friday #24: Augments - host_specific.json

You probably know about the def.json Augments file. However, are you familiar with host_specific.json? The def.json Augments file is read, if it’s adjacent to the policy entry. As such, this file is generally distributed as part of the policy set. Its settings apply to all hosts that receive and run the policy. The host_specific.json Augments file, is on the other hand loaded from the $(sys.workdir)/data/ directory. And it is expected to be independent from the policy.

How Ubuntu keeps you secure with KEV prioritisation

The Known Exploited Vulnerabilities Catalog (KEV) is a database published by the US Cybersecurity and Infrastructure Security Agency (CISA) that serves as a reference to help organisations better manage vulnerabilities and keep pace with threat activity. Since its first publication in 2021, it has gone beyond its US federal agency scope and has been adopted by various organisations across the globe as guidance for their vulnerability management prioritisation frameworks.

SD-WAN: Dead or Different?

The rapid evolution of work models and security requirements has prompted questions about the relevance of Software-Defined Wide Area Network (SD-WAN) technology. In their insightful report, ‘Is SD-WAN Dead?’ Jonathan Forest and Andrew Lerner of Gartner explore these dynamics, concluding that while SD-WAN is far from obsolete, its role is shifting.

Best Practices for Ensuring High File Integrity in Data Security

Data is essential for every business in the modern world. It is very important to keep this data safe because if it gets hacked, it could lead to terrible things like losing money, getting in trouble with the law, or having your reputation hurt. Imagine finding out that important business data or private customer information has been changed or hacked. The thought itself is scary.

The Intersection of Compliance and Risk vs Security in Financial Services

FSIs face rising compliance demands, squeezing budgets and cybersecurity risks. Open-source tech and careful vendor selection can mitigate these challenges. As explored in our two most recent blogs, changing compliance regulations and policies by specific regions and countries are having a significant impact on financial services institutions (FSIs).

How to get Into Cybersecurity? A Complete Guide

In today's digital age, cybersecurity stands as one of the most crucial fields, protecting our online lives from an ever-growing array of cyber attacks. As more personal and professional activities move online, the demand for skilled cybersecurity professionals has surged. This rapid growth presents a unique opportunity for those interested in diving into a field that is both challenging and rewarding.

Observability Meets Security: Build a Baseline To Climb the PEAK

When we hunt in new environments and datasets, it is critical to build an understanding of what they contain, and how we can leverage them for future hunts. For this purpose, we recommend the PEAK Threat Hunting Framework's baseline hunting process.