Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Cribl Collaborates with Microsoft: Empowering Enterprises to Strengthen their Security Operations

As the cybersecurity landscape becomes more and more complex. It seems like we hear about a major breach of a different company every day. Enterprises are looking for robust solutions to help them manage the surge in data and security incidents. That’s why our recent collaboration announcement with Microsoft means so much to us. It’s not just a piece of paper; it’s a testament to our dedication to providing customers with the best tools and solutions for the job.

Aligning Security & Ops with Intelligent Automation

Ivanti’s Alan Taylor previews his hands-on session at ISS 2024, demoing some of the powerful automation tools available to Neurons users and how they can drive better outcomes for IT, security and operations. Three Ivanti customers – Allison Hull from Maxar Technologies, Steve Clime from Fareway Stores, and Barbara Munger from Memorial Health Ohio – give their firsthand perspectives on migrating from Cherwell Service Management to Ivanti Neurons for ITSM.

Data source security in Grafana: Best practices and what to avoid

Recently, an incorrect security report was published, claiming that there’s a SQL injection attack in Grafana. As we have communicated to the security researcher, this report is wrong. Authenticated users in Grafana have the same permissions as the user configured for the underlying data source.

Tech Headaches Begone: 7 Insider Tips for Effortless Business IT Solutions

In this digital age, having efficient business IT solutions is paramount to ensure seamless operations. However, navigating through the complex IT realm can be overwhelming. Fortunately, you can rise above the challenge through business IT solutions catering to your business's specific needs. This article lists seven insider tips to help you achieve effortless business IT solutions.

Feature Friday #8: bundlesequence

Ever want to run just a one or a few select bundles from your policy? While developing policy it’s common to run cf-agent -KI so that you can quickly iterate on changes and the run the policy without locks. But if you are focused on select bundles you may not need the full policy to run, you can use the --bundlesequence option to specify one or more bundles overriding the bundlesequence defined in body common control. Let’s check out an example using the Masterfiles Policy Framework (MPF).

Why an Observability Pipeline is a Must Have for Security

Security is paramount for almost any sized organization. With the rapid pace of technological advancements and the increasing reliance on digital infrastructure, organizations face an ever-evolving landscape of cyber threats and risks. Protecting sensitive data, intellectual property, and customer information is no longer optional; it is a critical component of maintaining trust and credibility in the marketplace.

Identity Governance in Cribl.Cloud

This blog post explores Cribl.Cloud‘s approach to Identity Governance (IG), a crucial strategy for securing access to critical systems and data. Learn how Cribl.Cloud leverages IG to ensure security, compliance, efficiency, and customer trust, while also tackling the challenges of managing custom SaaS APIs within an IG framework.