Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How Ubuntu keeps you secure with KEV prioritisation

The Known Exploited Vulnerabilities Catalog (KEV) is a database published by the US Cybersecurity and Infrastructure Security Agency (CISA) that serves as a reference to help organisations better manage vulnerabilities and keep pace with threat activity. Since its first publication in 2021, it has gone beyond its US federal agency scope and has been adopted by various organisations across the globe as guidance for their vulnerability management prioritisation frameworks.

SD-WAN: Dead or Different?

The rapid evolution of work models and security requirements has prompted questions about the relevance of Software-Defined Wide Area Network (SD-WAN) technology. In their insightful report, ‘Is SD-WAN Dead?’ Jonathan Forest and Andrew Lerner of Gartner explore these dynamics, concluding that while SD-WAN is far from obsolete, its role is shifting.

Best Practices for Ensuring High File Integrity in Data Security

Data is essential for every business in the modern world. It is very important to keep this data safe because if it gets hacked, it could lead to terrible things like losing money, getting in trouble with the law, or having your reputation hurt. Imagine finding out that important business data or private customer information has been changed or hacked. The thought itself is scary.

The Intersection of Compliance and Risk vs Security in Financial Services

FSIs face rising compliance demands, squeezing budgets and cybersecurity risks. Open-source tech and careful vendor selection can mitigate these challenges. As explored in our two most recent blogs, changing compliance regulations and policies by specific regions and countries are having a significant impact on financial services institutions (FSIs).

How to get Into Cybersecurity? A Complete Guide

In today's digital age, cybersecurity stands as one of the most crucial fields, protecting our online lives from an ever-growing array of cyber attacks. As more personal and professional activities move online, the demand for skilled cybersecurity professionals has surged. This rapid growth presents a unique opportunity for those interested in diving into a field that is both challenging and rewarding.

Observability Meets Security: Build a Baseline To Climb the PEAK

When we hunt in new environments and datasets, it is critical to build an understanding of what they contain, and how we can leverage them for future hunts. For this purpose, we recommend the PEAK Threat Hunting Framework's baseline hunting process.
Sponsored Post

Security & AI Considerations in IT Monitoring Focusing on Microsoft SCOM & Azure Monitor SCOM MI

This whitepaper explores the pivotal roles of security and artificial intelligence (AI) in advancing IT monitoring capabilities, with a specific focus on Microsoft SCOM (System Center Operations Manager) and Azure Monitor SCOM Managed Instance (MI). It highlights how security measures safeguard monitoring data integrity and confidentiality while AI enhances predictive analytics, anomaly detection, and automated responses.

Crowdstrike outage and Security Posture Management with Descriptive Analytics

Last Updated on 15 hours The recent outage caused by Crowdstrike on Jul 18, 2024 has proved how the fallout was unforeseen and unthinkable, across the globe. In this era of zero trust, the leading cyber security company Crowdstrike sent an update to its Falcon sensor agent and another IT leader Microsoft which had Crowdstrike sensors installed crashed with Blue Screen of Death(BSOD) as soon as the update was received caused by a null pointer issue.