Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What you need to know about regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387)

On 1 July 2024 we released a fix for the high-impact CVE-2024-6387 vulnerability, nicknamed regreSSHion, as part of the coordinated release date (CRD). Discovered and responsibly disclosed by Qualys, the unauthenticated, network-exploitable remote code execution flaw affects the OpenSSH server daemon (sshd) starting with version 8.5p1 and before 9.8p1.

Stay Safe at Work: 6 Proven Tips to Avoid Accidents

Workplace safety is more than just a regulatory requirement; it's an essential aspect of maintaining a productive and healthy work environment. Accidents can happen in any workplace, from construction sites to office settings. Understanding how to prevent these mishaps can save lives and improve overall job satisfaction. In this blog post, we will explore six proven tips to help you stay safe at work. Whether you're an employer looking to safeguard your employees or an employee wanting to ensure your safety, these tips are designed to be practical and easy to implement. Let's get started on the path to a safer work environment.

Accidental Data Breach: Your Quick Fix Guide

Quickly learn how to handle an accidental data breach with our guide. Discover steps to mitigate damage, strengthen security, and effectively rebuild trust. I remember the day our system got breached. Data breaches can be extremely alarming, making you feel like everything is falling apart. But, guess what? You can learn a lot from such experiences about how to handle them like a pro! We'll share those insights next.

10 Steps to Optimize Software Operations with AI

How can businesses maintain a competitive edge and ensure operational efficiency? The answer lies in optimizing software operations with Artificial Intelligence (AI). By leveraging AI, companies can automate processes, enhance decision-making, and significantly improve their software operations. Are you curious about how AI can benefit your business? This guide aims to provide a comprehensive roadmap for integrating AI into your software operations, addressing common concerns and questions from IT managers, software engineers, and business leaders.

How To Protect Against Malicious Code

Malicious code, also known as malware, is any piece of software that deliberately damages your systems or causes them to malfunction (as opposed to a software bug that may unintentionally do these things). The reasons for this may be simple mischievousness, curiosity, or a proof of skill for bragging rights.

Configuring WhatsUp Gold for SMTP and OAuth 2.0 Email Authentication

This video shows the steps to register WhatsUp Gold as a client application with Microsoft Azure for OAuth 2.0 authentication. Then, it walks through the process to configure your WhatsUp Gold email settings to use OAuth 2.0 as your authentication method.

What is Privacy Preservation, and Why Is It Important

Let's talk Privacy! In this digital age, where everything from shopping to chatting happens online, keeping our details safe is more crucial than ever. We've all heard horror stories about identity theft and data leaks, right? That's why privacy preservation is a big deal-it's all about keeping our data under lock and key from those we don't want snooping around.

Install and uninstall packages based on conditions

For security reasons, you generally want to uninstall talk, samba, and apache2 in your infrastructure. However, on your webservers, which have the webserver CFEngine class defined, you might want Apache to be installed. With the conditional-installer module, you can put talk,samba,apache2 in the list of packages to uninstall. And in the list of packages to install, you can put apache2 with the condition webserver. Hence, the module will install apache2 on your webservers and uninstall it everywhere else.