Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Kosli - A Flight Data Recorder for your Runtime Environments

Have you ever had to debug an environment and found it hard to understand exactly what had changed? In the worst case scenarios you have to figure this out during high-pressure situations, like when an outage or regression has happened. Digging through platform logs and cloud consoles is a real nightmare, and it’s often futile because the information has disappeared.

Try Ubuntu confidential VMs with Intel TDX today: limited preview now available on Azure

On behalf of the Canonical confidential computing team, I am happy to announce the limited preview of Ubuntu Confidential VMs with Intel TDX on Microsoft Azure. As part of the DCev5-series and ECesv5-series VMs, they’re available for you to try today! This exciting development is an important milestone in Ubuntu’s journey to power the confidential public cloud of the future.

New Chrome and Edge zero-day exploits: How to patch CVE-2023-2033 and CVE-2023-2136

Two new zero-day exploits that affect the Chromium browser core were reported on April 14th. And since both Chrome and Microsoft Edge are based on it, Google advised to update the browsers. The vulnerabilities CVE-2023-2033 and CVE-2023-2136 can lead to remote code execution and have already been fixed. But that doesn't mean that's the end of the problem.

Introducing CrowdStream: A New Native CrowdStrike Falcon Platform Capability Powered by Cribl

We’re excited to announce an expanded partnership with CrowdStrike and introduce CrowdStream, a powerful new native platform capability that enables customers to seamlessly connect any data source to the CrowdStrike Falcon platform.

What Is Endpoint Security and How Does It Work?

This year, organizations around the world are focused on strengthening their endpoint security, especially since the average cost of data breaches is rising significantly. IBM’s data breach report confirms that the average global cost of a data breach is 4.35 million, and the U.S. average cost is 9.44 million. Endpoint security is a part of a cybersecurity program that prevents threats and attacks from damaging an IT environment.

How to Mask Sensitive Data in Logs with BindPlane OP Enterprise

Logs often contain sensitive data, including personally identifiable information (PII) such as names, email addresses, and phone numbers. To maintain security and comply with data protection regulations, it’s crucial to mask this data before storing it in your log analytics tool. BindPlane OP streamlines this process with the Mask Sensitive Data processor, ensuring your logs are safe and compliant.

How Technology Is Revolutionizing Event Management and Planning

Technology has been a significant driving force behind the transformation of event management and planning in every field. And the fashion world is no different. As event management and planning become increasingly digitized, event planners are discovering new and exciting ways to elevate the fashion world's already glamorous ambiance. This fusion of style and cutting-edge technology is taking the industry by storm, reshaping how events are organized, experienced, and remembered.

What is an SBOM and do you REALLY need it?

Your code base is growing more and more by the minute alongside the apps your business uses and develops. To give some context, the Linux Foundation Report estimated that “Free and Open Source Software (FOSS) constitutes 70-90% of any given piece of modern software solutions”. This means that 70-90% of your final software possibly depends on OSS.

The Benefits and Challenges of Building an SBOM

The EO 14028 regarding supply chain security and the need to generate a Software Bill of Materials feels closer to more and more organizations. It might feel like a threat - and that’s a fair feeling. The whole topic of Billing of Materials is not new, but it is a relatively recent trend for software.