Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Rest Assured, Cribl's Improved Webhook Can Now Write to Microsoft Sentinel

As version 4.0.4, we are excited to announce the capability of Cribl’s webhook to write to any destinations and APIs that requires OAuth including Microsoft Sentinel. Cribl has long supported OAuth in many destinations through native integrations but with the enhanced Webhook we can now write to any destination that require OAuth authentication.

Secrets Management: Use Cases, Best Practices, and Tools

To provide proper visibility into the health and status of your systems, observability tools require access to the internal and external services you’re using, and Sensu is no different. In the past, this could mean exposing sensitive authentication credentials like usernames and passwords with local environment variables or even by including the secret information in your monitoring configuration.

Endpoint Security: 8 Best Practices

Endpoints are the doorways to your organization’s data, resources, and other critical information. Unfortunately, cybercriminals are well-aware of these “doorways,” and often use endpoints as entryways for their cyberattacks. Today, the average enterprise uses and manages around 135,000 devices, and this number continues to grow every year. This means that organizations, now more than ever, need to protect their vulnerable endpoints.

Patch Windows Common Log File System Driver Vulnerability (CVE-2023-23376)

As the digital world becomes more interconnected, cyber threats evolve and become more sophisticated, putting businesses and individuals at risk. On February 14, 2023, Microsoft announced a critical vulnerability in the Windows Common Log File System (CLFS) driver, known as CVE-2023-23376. This vulnerability allows attackers to elevate privileges and gain unauthorized access to sensitive data, potentially resulting in severe consequences for affected systems.

How to setup Azure Key Vault

Microsoft Azure Key Vault is a cloud-based service designed to help organizations securely store and manage sensitive information such as encryption keys, secrets, and certificates. As more organizations migrate to cloud services, ensuring the security of sensitive data and applications is crucial. In this comprehensive guide, we will discuss Azure Key Vault with a focus on securing Blob Storage, providing how-to guides and best practices.

Announcing: Time-Based, Revocable, Leased - Dynamic Access Credentials for InfluxDB

Today we’re excited to announce the InfluxDB add-on for Ockam Orchestrator. Through the use of the add-on, customers that are using InfluxDB Cloud can use Ockam to improve their security posture by automatically granting uniquely identifiable, least privilege, time-limited credentials for any client that needs to connect to InfluxDB Cloud.

The 5 Biggest Enterprise Threats to Your Mobile Security and How to Prevent Them

The 5 Biggest Threats: You may have found your business is relying on mobile devices more and more. The computing power of phones and tablets can now equal that of your average desktop computer, but their portability makes them far more useful in a remote working environment. With the number of online communications options available to mobile devices, making a call on a mobile phone is almost an afterthought – but with a cloud business phone system, it is an option that is supported.

How to Comply with Current EU Regulations NIS2 & RCE

Individual EU Member States are expected to transpose the NIS2 and RCE directives into national legislation. It will concern not only critical, essential and important entities, but also National Security Authorities and various accredited CSIRTs. In this webinar, we discuss important milestones, individual measures and obligations, and the capabilities of the Flowmon solution, which can help organisations comply with directives and paragraphs of Cyber Security Acts, especially in the area of risk-management measures, network security monitoring and incident reporting.