Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Best CMMS Software Features and Its Benefits | Infraon

Do you want to streamline maintenance operations and increase efficiency in your business? An effective Computerized Maintenance Management System (CMMS) is the key to unlocking those benefits. CMMS software is a powerful tool to help you manage maintenance activities, inventory levels, and other related tasks. This article will discuss the best CMMS software features and their benefits. We’ll also discuss why CMMS is essential for business growth.

PagerDuty Announces New Automation Enhancements That Simplify Operations Across Distributed and Zero Trust Environments

Be sure to register for the launch webinar on Thursday, March 30th to learn more about the latest release from the PagerDuty Operations Cloud. Rundeck by PagerDuty has long helped organizations bridge operational silos and automate away IT tasks so teams can focus more time on building and less time putting out fires. And while this mission still rings true today, our vision is to extend this reality and revolutionize all operations while continuing to build trust.

How to properly check if files are readable

Opening and reading files may cause your program to block indefinitely, which is a major problem for configuration management tools like CFEngine. What if we make a program that can check if these file operations would block indefinitely, before using them? Unfortunately our good friend Alan Turing proved that such programs are not theoretically possible.

Reduce compliance TCO by using Grafana Loki for non-SIEM logs

Compliance is a term commonly associated with heavily regulated industries such as finance, healthcare, and telecommunication. But in reality, it touches nearly every business today as governments and other regulatory agencies seek to enact tighter controls over the use of our collective digital footprint. As a result, more and more companies need to retain a record of every single digital transaction under their control.

Best Practices for SOC Tooling Acquisition

Your Security Operations Center (SOC) faces complex challenges for keeping corporate data safe and in the right hands everyday. The right tooling is critical for success. Deciding when—and how—to make investments in SOC tooling is complex and challenging across organizations. There’s a ton of vendor spin out there and it’s important to understand what’s real and what isn’t.

Datadog Integration Update: Vulnerability Scanning and Audit Logs

The team at Cloudsmith is always looking for ways our customers and community can leverage adjacent technologies within the DevOps and application development ecosystem to secure the software supply chain. Cloudsmith developed the first integration with Datadog, the Cloud Monitoring as a Service solution, a few years ago! That integration was the first step in helping the community leverage both solutions simultaneously, strength for strength.

What is System Hardening? Definition and Best practices

System hardening means locking down a system and reducing its attack surface: removing unnecessary software packages, securing default values to the tightest possible settings and configuring the system to only run what you explicitly require. Let’s take an example from daily life.

Securing Your Monitoring Software With mTLS

Mutual transport layer security (mTLS) is an important subject among security, reliability, and engineering professionals who need to secure API communication as well as communication between machines and the applications and services they run. And for good reason: in 2022, the global average cost of a data breach was US$4.35 million, and almost double that in the United States at US$9.44 million.

Hacking the Cloud and Things to Watch Out for - Civo.com

Why should we be discussing cloud security in terms of internal infrastructure? This is exactly what Gillian Vanhauwaert from Defense.com spoke about in the final talk of the evening, as she outlined how aspects such as vendor lock-in, external facing, and phishing can impact your journey into the cloud.

How Domain Name Security Helps Prevent DNS Hijacking

You're probably aware of some security best practices to keep your business's digital presence safe. This might include uptime monitoring, security checks, and many others. But what about domain name security? Securing your business's domain name helps prevent commonplace domain hijacking and the associated chaos that comes with this specific type of cybercrime.