Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

File integrity monitoring with CFEngine

File integrity monitoring is an important aspect in managing your infrastructure. Tripwire and AIDE are often cited as necessary tools by compliance frameworks1,2,3. Of course CFEngine can manage a file to make sure it contains desired content, but did you know that CFEngine also has the capability to simply monitor a file for change? In this blog post we take a look at CFEngines’ changes attribute for files promises.

Governance, Risk and Compliance for MSPs in 2023

RedLin Murphy, N-able’s head of Governance, Risk and Complaince, as well as Dave MacKinnon, N-able’s Chief Security Officer discuss current and upcoming regulations that do or could impact MSP’s, what you can do to prepare for these things as cyber governance continues to at both the state and federal levels.

Six Mistakes To Avoid When Mapping Your Enterprise Data Landscape

Any organization that wants to make the most of its data needs to understand its data landscape clearly. Data mapping is essential to achieving this understanding, but it can be a complex task. There are several pitfalls that organizations need to avoid. Here are the six most common mistakes to avoid when data mapping your enterprise.
Featured Post

What's in store in 2023 for the tech industry?

The tech scene is expanding rapidly across the world. In fact, in the last year alone, within the UK, a new tech unicorn was created every eleven days - more than doubling the number of UK unicorns from 2017. From AI and automation, to DevOps and data engineering, innovations are continuing to reshape and improve our everyday and working lives, critical at this time of socio economic instability. Here are thoughts from tech leaders, globally, exploring what 2023 has in store.

Security holiday calendar - Part 1

As it was well received last year, we decided to do another security-focused holiday calendar this year. The concept was roughly the same, but instead of only adding security hardening modules, we’ve also added in some other security advice and blog posts to improve the variety. Now that we’re halfway through to 24 (or 25), let’s recap the first half of the calendar.

Building a Compliance Report based on inventory modules

In CFEngine Enterprise we collect information from each system in the infrastructure as inventory. Some inventory is available by default, and more can be added using modules or writing policy. You can use inventory information to create a Compliance Report with checks that determine if the information complies with your security requirements. In this blog post, we will use some modules from CFEngine Build which provide inventory data, and build a Compliance Report on top of those.

Top 5 benefits of network backup software

One of the leading and most catastrophic causes of is misconfigurations or faulty configurations. This type of downtime may occur at any moment suddenly, even sometimes turning out to be a surprise for network admins. Whenever this type of downtime occurs, it is mandatory for network admins to find the root cause of the issue in order to troubleshoot and then bring the network back up. This is hectic as well as time-consuming, leading to a loss of precious time for the organization.

Grafana 9.3 feature: Grafana OAuth token improvements

As part of our efforts to improve the security of Grafana, we introduced a long-awaited feature in the latest Grafana 9.3 release that enhances Grafana’s OAuth 2.0 compatibility. The new Grafana OAuth token improvements, which are available in Grafana OSS, Grafana Cloud, and Grafana Enterprise, ensure that the user is not only logged into Grafana, but they’re also authorized by the OAuth identity provider.

The What, Why and How of Auto-Remediation in Cybersecurity

When you’re facing a cyberattack, waiting even just minutes to respond could be the difference between business as usual and a calamity. It may only take that long for threat actors to exfiltrate sensitive data or disrupt critical systems. That’s one reason why automating remediation is an essential ingredient in an effective cybersecurity strategy.