Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Navigating User Experience, Performance & Security

In the ever-evolving digital landscape, where users expect lightning-fast, seamless experiences, a thoughtful balance needs to occur between creating a unique website experience and achieving optimal performance whilst tackling the mounting threats posed by cybercriminals. This predicament places website owners and developers at a crossroads: How can they achieve great user experience (UX) while upholding stringent security protocols with a well-performing website?

Detecting Cryptojacking with Progress Flowmon

In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.
Sponsored Post

Threat Hunting Frameworks and Methodologies: An Introductory Guide

Establishing an effective cyber threat hunting program is among the top priorities of enterprise security leaders seeking a proactive approach to detecting and counteracting potential threats. Furthermore, implementing a proactive threat hunting program, security teams that leverage formalized frameworks or threat hunting methodologies are far more likely to detect vulnerabilities or in-process malicious activities in their environments than those that do not. However, data from a 2023 threat hunting survey revealed that while 73% of organizations have adopted a defined threat hunting framework, only 38% actually follow it.

Google's latest email policy and safer, more secure inboxes

Say that you're a bulk sender (in Google's terms, a user who sends more than 5,000 emails at once). You send a couple of emails and are baffled with alert messages that state your emails are unauthenticated; it can be shocking and annoying. In 2022, a staggering 333 billion emails were sent daily. According to data released by Google, unauthenticated messages received by Gmail users plummeted by 75%.

Your Cyber Safety Checklist for Business Travel

As we roll into 2024 proper, the events are starting to appear in the calendar again. In an era where connectivity is ubiquitous and threats are omnipresent, safeguarding sensitive data and digital infrastructure demands extra attention, especially during business travel. As MSPs, your role extends beyond mere provision of services; you’re entrusted with the security and integrity of your clients’ networks and systems—and, of course, that includes protecting your own.

Understanding Role-Based Access Control (RBAC) in SharePoint Online

Role-Based Access Control (RBAC) is a sophisticated method designed to streamline the management of user permissions within software environments, including SharePoint Online. At its core, RBAC allows administrators to assign system access to users based on their role within an organization rather than on an individual basis. This approach simplifies the process of granting appropriate access levels by grouping permissions into roles that correspond to job functions.

Gartner Lays out Three Use Cases of Network Detection and Response (NDR) Adoption

The Gartner recent report, “Emerging Tech: Top Use Cases for Network Detection and Response”, lays out three primary use case drives, which include: Before we dive deeper into Gartner findings, let’s talk about NDR from a high level.

What is the Cost of SSO Software? SSO Pricing

Single sign-on (SSO) is an important security function for many business enterprises, especially with the rise of more cloud apps and services. Essentially, an SSO allows a user to log into a device only once with a single set of credentials to gain access to a variety of corporate apps, websites, and data.

Capturing Security and Observability Data From Oracle Cloud

A couple of years ago, I wrote another blog on how Oracle Cloud Infrastructure (OCI) Object Storage can be used as a data lake since it has an Amazon S3-compliant API. Since then, I’ve also fielded several requests to capture logs from OCI Services and send them through Cribl Stream for optimization and routing to multiple destinations. There are two primary methods to achieve this.