Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

CVE-2024-21410: Ensuring Secure Firmware Updates in Industrial Devices

Security vulnerabilities are a serious issue for any organization. Even a single unpatched flaw can lead to disastrous consequences, including data breaches and loss of system integrity. CVE-2024-21410 is one such vulnerability that presents a significant risk. Found in a popular application used by many organizations, this flaw can leave systems exposed to attacks if not addressed promptly.

At a glance Cisco Secure Application

Take a closer look at how combining advanced monitoring with elite defense strategies provides true security. Our integrated approach leverages sophisticated security technology, such as our bundled agents, ensuring the fastest time to value. Our agents also ensure you have code-level security visibility for vulnerabilities and threats. We provide application-level security - from the inside out!

Machine Learning and AI Explained

There is no escaping the discussion about how machine learning (ML) and AI systems will revolutionize how people and industries work. Most of this discussion needs to be revised, as companies are still evaluating how AI systems (typically Large Language Model (LLM) systems like OpenAI ChatGPT, Google Gemini, Anthropic Claude and others) enhance worker productivity and deliver business benefits. Cybersecurity is one sector where extensive use of AI-enhanced solutions is common.

The Importance of Securing Data in Traces

Trace spans are captured in the runtime after decrypting the request. This means that any sensitive data is available in plain text. This is also the case for logging; however, logging requires an explicit log statement to be coded by the engineer. Additionally, engineers can add arbitrary information to trace spans, which could expose sensitive information. Collecting sensitive information in trace spans or logging events could expose an organization to a number of risks.

CrowdStrike: Are Regulations Failing to Ensure Continuity of Essential Services?

In recent years, regulations have been enacted that intend to ensure the continuity of essential services and mitigate security and availability risks. These regulations include the Digital Operational Resilience Act (DORA) and Network and Information Systems Regulations (NIS Regulations). In light of the recent incident involving CrowdStrike's Falcon system, it is legitimate to ask whether these regulations are truly effective.

Feature Friday #26: Groups custom promise type

There’s a users promise type for managing local users. However, did you know there is also a custom one for managing local groups? You might have seen it mentioned in the CFEngine Build announcement, the blog post on Managing local groups, or in the announcement supporting custom bodies post. But let’s take another look. The easiest way to integrate the groups custom promise type is by using cfbs, simply cfbs add promise-type-groups in your project.

5 ways teams used BigPanda during the CrowdStrike outage

In the weeks since the Crowdstrike outage brought millions of systems to a halt, countless articles have been written about the cause of the outage, its impact, and the costs companies incur during service disruptions. Nearly every large company had hosts offline due to the faulty update in CrowdStrike’s Falcon software. BigPanda customers were no exception. On July 19, between 04:00 and 07:00 UTC, the BigPanda systems logged an increase in shared incidents.

How to Sell Security with N-able Head Nerd Stefanie Hammond

In this episode, Stefanie Hammond, N-able Head Nerd for Sales and Marketing, talks to Pete Roythorne about her new Selling Security Digital Playbook—Defend and Prosper: Maximizing the Cybersecurity Opportunity—which focuses on giving MSPs a step-by-step guide to building, pricing, marketing, and selling security services. During this conversation she emphasizes the importance of understanding the target market and their needs, as well as the value of bundling security services instead of selling them as individual tools.

The Impact of Technology on Kubernetes Consulting Service Trends

The internet is used for almost everything nowadays, from sending and receiving messages to transferring money between bank accounts. With more and more people using the internet, there is greater demand for web applications. Kubernetes is an open-source platform that helps with deploying, scaling, and the management of web applications. As a platform, Kubernetes can be confusing for beginners to master. Because of this, consultancy firms have established themselves as authorities and can help businesses use Kubernetes. This post intends to tell you how modern technology has influenced Kubernetes consultancy trends.

A Comprehensive Guide to Unified Endpoint Management

Unified endpoint management (UEM) is software that monitors, manages, and secures desktop computers, laptops, and mobile devices in a single pane of glass. It is a comprehensive approach to the modern workforce, integrating mobile device management (MDM) and enterprise mobility management (EMM) in a centralized dashboard. The most obvious benefits are operational efficiency and improved data governance.