Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to Augment an Existing Data Lake with Exabeam and Cribl Stream

Organizations have different data lakes they use to search, whether it is Splunk, Qradar, or Sumo Logic just to name a few. Exabeam (UEBA Advanced Analytics) sits on top of those existing data lakes and pulls specific sources by running continuous queries every few minutes into Exabeam. The image below shows a Splunk query to pull windows event logs into Exabeam Advanced Analytics over the port (8089). The query is complex.

The Economics Behind Cloud-First Data Protection

If you’re still reliant on legacy local-first backup, you may not fully realize the financial impact of old-school image backup on your business. In today’s cloud-first world, it’s time to take a look at a modern cloud-first approach to data protection as a service. This webinar will walk you through the hidden (and not so hidden) costs of continuing to manage backup using either an image-based software product (like Veeam) or an integrated appliance (like Datto). We’ll do the math to show you a more cost-effective alternative.

Graylog 5.0 - A New Day for IT & SecOps

We are excited to announce the release of Graylog 5.0! Graylog 5.0 brings updates across our entire product line, including changes to infrastructure, Security, Operations, and our Open offerings. For more detailed information on what’s changed, visit our changelog pages for Graylog Open and Graylog Operations/Graylog Security.

Torq Users Hit 1,000,000+ Daily Security Automations

Security automation is an increasingly critical element in optimizing enterprise cybersecurity postures. Today, Torq announced its users are executing more than 1,000,000 daily security automations using our security automation platform – a major milestone that underlines the traction and importance of unifying today’s complex security stacks.

Don't be held to ransom: Security awareness with Platform.sh

Ransomware is an ever-evolving type of malicious software (a.k.a malware) in which an attacker encrypts the files on a victim’s device, rendering it inaccessible and unusable. Then - you guessed it - they demand a ransom from the target before they’ll fix it. Not something any organization ever wants to deal with, and not something any organization has to deal with if they have the right measures in place to minimize the risk. Let’s talk about how!

4 API Security Best Practices To Safeguard Sensitive Data

Thanks to the increasing usage of different software solutions, API usage has become an everyday practice. As such, API security is a more prevalent issue in app development than ever before. SaaS companies have an average of 350 integrations, whereas major SaaS companies like Slack, Zoom and Shopify have 2,000+ integrations. This is great for developers and end users, as Application Programming Interfaces (API) make life easier.

Baking Security into your DevOps Supply Chain with Argo CD & OPA - Dan Garfield (DevOps Experience)

Argo CD has become the defacto entry for engineering teams to deploy and manage their applications while Open Policy Agent has become one of the most reliable security policy enforcement engines. These two tools work perfectly together and yet there are very few articles and videos on the subject! In this talk, we look at the best strategies for getting these tools to work together to improve the software delivery supply chain. We’ll look at admission hooks, sync waves, and other ways to ensure your applications and clusters are always running in a secure and safe manner. Including example files and reference repos.

Cyber, incident, downtime: Three words that chill the board, and how to tame them

There are three words that every member around a boardroom table fears when they hear them strung together: "Cyber... incident... downtime". They are never the precursor to a good meeting! Technology incidents can leave the business in the dark and bring the wheels of industry grinding to a halt. With no operational systems, a Gartner report found that companies can lose up to half a million dollars per hour from severe incidents based on losses and remediation.