Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The Importance of Observability Pipelines in Gaining Control over Observability and Security Data

Today’s enterprises must have the capability to cope with the growing volumes of observability data, including metrics, logs, and traces. This data is a critical asset for IT operations, site reliability engineers (SREs), and security teams that are responsible for maintaining the performance and protection of data and infrastructure. As systems become more complex, the ability to effectively manage and analyze observability data becomes increasingly important.

Data Shredding vs. Recycling: What's the Difference and Why Does it Matter?

In today's world, data is one of the most valuable assets a business can possess. However, with the rise of cyber threats and data breaches, it has become increasingly important for companies to properly dispose of their old data. This brings us to the two most common methods of data disposal: shredding and recycling. In this article, we will explore the differences between data shredding and recycling, and why it matters for your business.

6 Signs Your Company is Experiencing Data Breaches

Do you always stress about the confidential data your business owns? You have a valid reason to worry because data security risks are a growing concern and the stakes have never been higher. According to a recent report, the global cybercrime cost may reach $10.5 trillion by 2025. Businesses must be vigilant about potential data theft and take proactive measures to protect themselves.

Beyond Logging: The Power of Observability in Modern Systems

Observability has now become a key aspect of designing, building and maintaining modern systems. From logs to distributed tracing and from distributed locking to distributed tracing, observability as a function has gone beyond logging. With so many aspects to be taken care of, it thus becomes essential to have an observability toolchain which is comprehensive and comprehensive without making it complex. In this blog, we will explore the underlying motivations behind observability, the various tools available to enable it, and the various components of the same.

Empowering Security Observability: Solving Common Struggles for SOC Analysts and Security Engineers

Join Ed Bailey and GreyNoise founder Andrew Morris as they share insights on how Cribl and GreyNoise help SOC analysts overcome common struggles and improve security detections and incident resolution. Through personal stories and real customer use cases, they'll demonstrate how combining these solutions can make a real difference in the day-to-day lives of SOC analysts. You'll also gain valuable insights into data flow and architecture, and learn how GreyNoise can drive outsized value. Don't miss this opportunity to enhance your security observability skills.

4 Tools to Help Protect Against Online Identity Theft

Online identity theft has become a significant concern for everyone, especially as we rely more on the internet for various activities such as shopping, banking, and socializing. Identity theft occurs when someone steals personal information, such as name, address, social security number, or credit card details, to commit fraudulent activities. The consequences of identity theft can be severe: $15.1 billion in monetary loss in a given year alone!

The FireEye/SolarWinds Cyber Attack | Security Insights Podcast: Ep. 1

Ivanti Senior Director of Product Management, Chris Goettl, and former Chief Security Officer, Phil Richards, join host Adrian Vernon to discuss the recent cyber attack that affected many dozens of organizations around the world, including multiple U.S. government agencies. This is one of the largest-scale cyberattacks in recent history.