Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Top 10 CI/CD Security Risks and Solution

In the realm of Continuous Integration and Continuous Deployment (CI/CD), security is paramount. However, as organizations rapidly adopt CI/CD practices, several security risks emerge. Understanding and mitigating these risks is crucial to maintaining a secure and resilient software delivery pipeline. Below is a detailed exploration of the top 10 CI/CD security risks.

CDK Global: A Cold-Hearted Reminder of Why Patch Management Matters

A few weeks ago, CDK Global, a software provider with 15,000 North American car dealership customers, faced back-to-back cyberattacks, effectively taking down scheduling, records, and more for their thousands of customers for days. The CDK Global attack is also the latest cyber incident to spur larger industry-wide conversations around the supply chain risks posed by increasingly ruthless and aggressive bad actors.

Dynamic Application Security Testing at Cribl

Dynamic Application Security Testing (DAST) is a type of security testing that actively exercises and inspects a web application for security vulnerabilities. A DAST scanner sends an assortment of payloads to the target application, typically through HTTP requests for web applications, then analyzes the responses and behavior to detect vulnerabilities. DAST is language and framework agnostic, allowing for security scans against any web application with careful configuration.

5 Ways AI Can Help You Create a Better Website

Within the current digital era, having a website that is both well-designed and useful is basic for individuals, businesses, and organizations trying to develop an online presence. The improvement of artificial intelligence (AI) has made it simpler and more effective to create better websites. To form beyond any doubt your website stands out online, consider these five ways AI may help with its development, design, and optimization.
Sponsored Post

What's new in Avantra 24.2

It's my pleasure to announce the release of Avantra 24.2. The second update of Avantra 24, building upon 24.1 which brought performance and customer requested bug fixes, 24.2 brings new innovations and enhancements to our Avantra platform. With over 300 changes in our development management system, Avantra 24.2 feels like a major release to us and we have something new everywhere you look. Let's dive deeper into the new features.

Cyber Defense 202: Exploit Vulnerabilities | Security Insights Ep. 41

Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 in Chris' and Robert's hearts.

Feature Friday Feature Friday #20: Macros

Did you know CFEngine has Macros? They were first introduced in CFEngine 3.7 (back in 2015), and more have been introduced since then. Macros are convenient for preventing the parsing of a section of the policy. It is handy for protecting older binaries from getting tripped up on newer syntax the agent does not understand. Let’s take a look. Currently there are 8 macros. You can find examples of use within the Masterfiles Policy Framework.
Sponsored Post

Can the EventSentry Agents cause the same outage & disruption like the CrowdStrike Falcon sensor did?

The faulty Rapid Response Content CrowdStrike update that disabled millions of Windows machines across the globe on 7/19/2024 was any IT professional’s nightmare. Having to manually visit and restore each affected machine (further complicated by BitLocker) severely limited the recovery speed, especially for businesses with remote locations, TVs, kiosks, etc.