Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

SOS! The Summer of Security is Here. Stay Safe Out There

Summer safety is usually all about life jackets, pool floaties, outfitting your boat with a carbon monoxide detector and slathering on plenty of SPF. I have one more thing to add to your list this summer: Security to protect your people, your brand and your data. In 2020, the business world struggled with the abrupt shift to remote work. Corners were cut. Compromises were made. Business leaders, IT staff and employees alike did the best they could with what they had.

What's new in Calico Enterprise 3.7: eBPF data plane, high availability, and more!

As our enterprise customers build out large, multi-cluster Kubernetes environments, they are encountering an entirely new set of complex security, observability, and networking challenges, requiring solutions that operate at scale and can be deployed both on-premises and across multiple clouds. New features in our latest release add to the already formidable capabilities of Calico Enterprise.

Practical CPU time performance tuning for security software: Part 2

In a previous blog, we discussed how to monitor, troubleshoot, and fix high %CPU issues. We also revealed a system API that could have an unexpected impact on CPU consumption. In this episode, we’ll discuss another time-related performance aspect that is unique to security software: application startup time. You don’t need to be a developer to benefit from this article.

Top 3 Ways Work From Anywhere Has Unknowingly Increased Your Security Risk

Teneo’s Andy de Clerck and Matt Lukash, and eSentire’s Mark Sangster discuss how users across the globe have left the safety and security of the traditional workplace, leaving companies at their most vulnerable because the full scope of their security exposure is unknown.

Correlate CrowdStrike Data with Logz.io Cloud SIEM

Crowdstrike is an innovator in the endpoint protection market with innovative approaches for the last decade. They specialize in depth of data collection and have uncovered many forensic mysteries in security over the last 10 years. We have many mutual customers with CrowdStrike, which is why we began working with them on a solution to analyze and correlate their data within Logz.io.

Kaseya VSA Cyberattack: A Statement on Solidarity from N-able CSO Dave MacKinnon

The recent Kaseya VSA cyberattack is an important reminder of how security works best when we approach it as a community. The adversarial pivot to supply chain-based attacks for delivering ransomware underscore the role we all must play in helping to keep each other protected.

A Look at Today-The "New Normal"

We’ve reviewed the year that was, how business big and small had to fast forward their digital transformation to accommodate remote work and keep their businesses in business. Some IT leaders have said because of the pandemic, they were able to expedite digitalization and digital transformation within their organizations. Efforts previously envisioned to take months or years were moved forward and achieved in a matter of weeks.

Elastic Security prevents 100% of REvil ransomware samples

Users of Elastic Security are protected through numerous layers of protections against the REvil ransomware that affected Kaseya VSA and its customers. Elastic Security’s layered protections prevented 100% of the REvil ransomware samples tested before damage and loss could occur to the business. We believe that detections and preventions must be layered, as no single protection works 100% of the time.