Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Preventing Cookie Consent Banners in Synthetic User Journeys

Cookie consent banners and popups are a little like that annoying friend who turns up at your house unannounced when you’re trying to do the washing, asks too many questions and is tricky to get to leave. They’ve also brought their 3 year old with them who’s favourite past time is to pull on your dog’s tail and stare at their private parts. Unlike such visitors, cookie consent banners can be prevented in your synthetic user journeys if you know how.

Enable GitOps for Kubernetes Security - Part 1

“How do I enable GitOps for my network policies?” That is a common question we hear from security teams. Getting started with Kubernetes is relatively simple, but moving production workloads to Kubernetes requires alignment from all stakeholders – developers, platform engineering, network engineering, security. Most security teams already have a high-level security blueprint for their data centers.

Monitor these loopholes to ensure complete network security

The continuous evolution and growth of the endpoint devices in enterprises makes network security management a primary concern for IT departments. As a sysadmin, you strive to ensure the safety and security of every device in your network. You are on a constant lookout for vulnerabilities and issues that might disturb the shield that protects your enterprise devices. With dynamically changing trends and technologies, it’s easy to miss details that might compromise your network’s armor.

Web browser security. Is it really safe?

If there is still a reason why you have a post-it covering the webcam of your laptop, if you have not yet had the audacity to delve into the deep web despite all the mysteries they say it contains, if you only enter the Internet in incognito mode, sitting in your armchair with a blindfold: then you’re worried about one thing: safety. Today, in our blog, we will discuss Web browser security. Which are the safest? Is there life beyond Google Chrome?

The importance of event correlation techniques in SIEM

Event correlation tools are a fundamental instrument in your toolbox to detect threats from all sources across your organization in real time. A wise use of the right event correlation techniques through log management and analysis is the cornerstone of any reliable security information and event management (SIEM) strategy – a strategy that focuses on prevention rather than reaction.

Requirements of a Security Platform in a DevOps World

Businesses today cannot afford to be hacked. Cyber attacks can result in hefty fines and lawsuits, not to mention the reputational damage that can result in long-term revenue loss. Of course, this has always been true. But what has changed over the past few years is both the sheer volume of attacks and the growing sophistication used in them. As a result, there is a need an updated and upgraded kind of SIEM security platform to face them.

12 mobile device features that help ensure corporate data security

Our hearts might skip a beat every time we put our hands in our pocket and can’t find our mobile phone, and we’re filled with dread at the thought of losing the device that contains our personal photos and the corporate data saved on it. But just misplacing a device is not how we put corporate data at risk; small actions in our day-to-day lives can have a major impact on the safety of the corporate data on our devices.

Combating threats with UEBA: Money matters

In this four-part series, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at unforeseen security attack scenarios, and discover how user and entity behavior analytics (UEBA) can be leveraged to safeguard organizations. In this second post of the series, we’ll examine cyberattacks that threaten the financial sector.

How Log Analytics Improves Your Zero Trust Security Model

Over the past few years, cloud computing has passed through its hype and early-adopter phases. Now we are hitting the peak of migration from on-premise to cloud-based infrastructure. Consequently, this transition and the advent of cloud computing has dramatically changed the way we think about security. Namely, the security paradigm has shifted towards a Zero Trust Security Model.