Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introducing Project and Workspace Access Tokens

A few months ago we introduced Repository Access Tokens which were the first of the new resource-based authentication methods we are introducing to Bitbucket Cloud. Repository Access Tokens enable a convenient, yet secure way to manage access for users to a specific repository. While repository access tokens enable you to allow you to control access at a granular level, they are not scalable.

Learn How to Streamline Endpoint Data Collection and Send it to Grafana Cloud for Monitoring with Cribl Edge

You’re responsible for administering hundreds to thousands of server endpoints deployed at your company. You receive daily requests from the application teams requiring agents be installed on new servers, from the compliance team tracking agent upgrades and from the operations team concerned logs and metrics are missing from the dashboards they’re monitoring. You review your workload and realize you must log into each individual server for every request you’ve received.

SASE: A Long-term Play for Security

Secure Access Service Edge (SASE) is a strong trend emerging in enterprise network security, representing the long-term capability to integrate and consolidate a variety of networking and cybersecurity tools. Let’s do a quick dive on the technology to understand why it’s necessary. SASE emerged as an outgrowth of the software-defined wide-area networking (SD-WAN) technology movement, which made it easier to configure, orchestrate, and manage WAN connectivity from enterprise branches.

Causes of Data Center Outages and How to Overcome Them

With the increasing computing requirements and complexity of data center systems, unplanned downtime has become a severe threat to enterprises in terms of process violations, revenue losses, and reputational issues. Although data center failures are quite common, it can be difficult to predict every scenario that might have a severe impact on the expansion of your company. Especially when some factors, like a natural disaster, can simply be beyond your control and result in data center outages.

How to test for expired TLS/SSL certificates using Gremlin

Transport Layer Security (TLS), and its preceding protocol, Secure Sockets Layer (SSL), are essential to the modern Internet. Encrypting network communications using TLS protects users and organizations from publicly exposing in-transit data to third parties. This is especially important for the web, where TLS secures HTTP traffic (HTTPS) between backend servers and customers’ browsers.

Five ways to strengthen your security posture before high-incident seasons

Here are five ways to protect your organization from cybersecurity attacks and vulnerabilities during high-incident seasons. With the busy holiday season over, is it safe to let your guard down concerning cybersecurity? Not exactly. While the holiday season is often seen as prime time for cyberattacks, it’s not the only time of year organizations experience a surge in cyber threats.

Website downtime and ways to prevent it from happening

In a modern world, every business needs to be present on the Internet, or it will literally fall behind competitors by a huge margin. And this presence in the form of a website should not only be full of useful and high-quality content, but it should also work like a clockwork mechanism from top to bottom. It must be accessible anytime to anyone from anywhere. Of course, such a thing is impossible, because of the maintenance issues, but it shouldn't hold a website owner back from aiming at the highest accessibility time possible.

The Limitations of Endpoint Detection and Response (EDR)

Every IT environment – whether it’s on-prem or in the cloud, and regardless of how it’s designed or what runs in it – is made up of endpoints. That’s why Endpoint Detection and Response, or EDR, has typically been one of the pillars of cybersecurity. EDR helps businesses monitor each of their endpoints for security risks so that they can detect problems before they escalate to other endpoints.

Held for Ransom - Ransomware Detection & Response with Flowmon ADS

Flowmon Anomaly Detection System takes an AI-based approach to detecting and alerting on the presence of threat actors within your network from the point of initial access all the way through to exploitation. Gaining visibility into a Ransomware attack by mapping a threat actors earliest movements within your network enables you to stop the attack in its infancy. Flowmon's forensic visibility has you covered with all of the evidence you will need to conduct your investigation following an attack attempt.