Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Understanding Zero-Day Vulnerabilities in Software Supply Chain

A Node.js module with nearly two million downloads a week was compromised after the library was injected with malicious code programmed to steal bitcoins in wallet apps. Join us as we delve into a real-world zero-day supply chain attack. Understand the response that followed, and how attacks like this can be mitigated. Learn from David Gonzalez, Principal Engineer at Cloudsmith and Member of the Node.js security working group, as he walks us through the incident.

Kubernetes Security Challenges with Armo - Insights from KubeCon NA 2023 - Civo TV

Ben from Armo and a key maintainer of the Kubescape project shares expert advice on securing Kubernetes in multicloud environments. Dive deep into the challenges and solutions for Kubernetes security, as Ben offers practical tips and strategies.

CMMC v2 Compliance with EventSentry

A quick overview on how EventSentry can help organizations become CMMC v2 compliant. EventSentry features actionable dashboards and reports to become and STAY compliant. But EventSentry goes beyond compliance - the monitoring and security features of EventSentry can be leveraged by any compliance framework. The result is a network that's compliance AND secure.

Out-of-band communication: Maintaining business continuity

Today, most organizations rely on several different secure communication mediums — like email, real-time chat, video calls, and SMS — to transmit information, collaborate, and keep teams aligned. While modern communication tools help teams stay connected, the digital landscape is not without its challenges. For most organizations, it’s only a matter of time before network disruptions, security breaches, and system failures impact main lines of communication.

Analytics Plus webinar: Catch critical signs of vulnerable security protocols

Security is all about addressing every potential vulnerability and creating formidable barriers to deter malicious actors from breaching your sensitive data. Given the multitude of vulnerabilities that need attention, security professionals often find themselves inundated with tasks. It's not just a matter of strengthening your infrastructure; it's about ensuring that every potential entry point is securely sealed to thwart malicious actors' attempts to compromise your infrastructure.

Analytics Plus webinar: How to make the help desk your first line of cyberdefense

When it comes to detecting a cyberattack, machine data such as logs, metrics, and telemetry is all-important. Sifting through mountains of machine data and recognizing threats is one way to secure your organization. But prevention is better than cure, and sticking to the basics and following best practices is the best way to keep threats at bay. Since the help desk holds a record of everything that happens in your IT, connecting help desk operations and events with common gateways helps prevent loopholes from being exploited.

Warning Signs of Weak Cyber Security

We live in a world where cyber security is more important than ever. With data breaches becoming all too common, it's critical to understand the warning signs of weak cyber security so we can stay protected from potential hackers and their malicious activities. In this blog post, we will explore the top warning signs of a potentially vulnerable system that could be targeted by attackers and provide some tips on how to fortify your online defenses.