Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Empowering SecOps Admins: Getting the Most Value From CrowdStrike FDR Data With Cribl Stream

In this live stream, Sidd Shah and I discuss how Cribl Stream can empower Security Operations Admins to make the most of their CrowdStrike FDR data. They address the challenges faced by CrowdStrike customers, who generate a vast amount of valuable data each day but struggle to leverage it fully due to complexity and size.

Air-Gapped Kubernetes with D2iQ (AFCEA West 2023)

From secure air-gapped environments to ease of use John Sickle, President and General Manager of D2iQ Federal, shares some of the reasons why the D2iQ Kubernetes Platform works for our partners at the Department of Defense and in the military. We provide the support, training and military-grade security required to help our government partners quickly and easily get into production and complete the mission at hand.

Security and real-time Linux in a shifting automotive world

Software is completely changing the automotive industry - from vehicle design to use and maintenance. The whole lifecycle now relies on software and vehicles resembling “computers on wheels”. But vehicles aren’t regular devices like smartphones. They move humans at hundreds of kilometers per hour and need to be safe and secure at all times. When there is software involved, there are always security vulnerabilities. No cybersecurity expert can say the opposite. How can the automotive industry navigate the shift towards software-defined vehicles while ensuring the best level of security?

How Are SASE and SD-WAN Related?

SD-WAN and SASE both build on traditional network models, such as those used to connect a company’s offices. While the two models share some features and advantages, they have different structures and approaches. In the simplest terms, an SD-WAN inspects and routes data more efficiently, while a SASE combines networking and security functions into a single service. Here’s what you need to know.

Outlook Zero-Day (CVE-2023-23397) Fix for N-central and N-sight

As you likely be all too aware, there is a Microsoft Outlook zero-day vulnerability listed under CVE-2023-23397. With the increased attacks on Outlook this month, Microsoft has pushed out fixes for about 80 Windows flaws. More information on some of those patches can be found in my colleague Lewis Pope’s March 2023 Patch Tuesday blog. Lewis was also kind enough to send over the remediation script for both N-able N-central and N-able N-sight.

Control and Audit Remote Control Actions for Security

In an article a few months ago, my colleague covered the functionality within eG Enterprise that ensures secure and traceable audit trails for both users and admins of eG Enterprise allowing automated auditing and reporting for regulatory compliance and security, see Auditing Capabilities in IT Monitoring Tools | eG Innovations. Today, I will follow from this article and cover how eG Enterprise also controls and audits the execution of Remote Control Actions and scripts.

5 tips on how Developers, DevOps and security teams can work together

As we all know, team collaboration can sometimes be a bit complicated. Especially when different teams in the organization strive to achieve their own individual goals. This is where new organizational practices, such as DevOps and DevSecOps, have paved the path for us to work together and achieve our mutual goals. Take a look at these three trying to make it work… Triple Therapy for your Dev, Sec AND Ops Teams.

In the World of Privacy, Nothing is Free - Including Social Apps | Security Insights Podcast: Ep3

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

What is Penetration Testing?

Penetration Testing -- also known as “pentesting” -- are used by cybersecurity professionals and managed service providers to identify vulnerabilities present in a system before a cybersecurity incident takes place. You will often come across clients asking you to perform penetration testing, especially as emerging government regulations begin to make the practice mandatory.

What is SOAR (Security, Orchestration, Automation, and Response)?

As a managed service provider, you know that cyberthreats are increasing in frequency, sophistication, and impact. In recent years, we have seen a dramatic increase in the number of cyber-attacks targeting businesses, governments, and individuals. This explosion of cyberthreats highlights the need for businesses and individuals to take cybersecurity seriously and implement modernized security measures to protect themselves against these threats.