Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Enhancing Support for Zeek (Bro) in Logz.io Security Analytics

We’re happy to announce official support for Zeek in Logz.io Security Analytics for easier security monitoring! Logz.io Security Analytics provides a unified platform for security and operations designed for cloud and DevOps environments. It’s built on top of Logz.io’s enterprise-grade ELK Stack and is extremely easy to set up and integrate with.

Sumo Logic Helps ABinBev Modernize its Security Operations Center

What do beer and data analytics have in common? Learn how iconic beer vendor Anheuser Busch in Bev (ABinBev) relies on Sumo Logic to give them real-time security insights into their global security operations center (SOC) and helps showcase the value of security within the organization through dashboards and metrics.

Homelab Security with OSSEC, Loki, Prometheus, and Grafana on a Raspberry Pi

For many years I have been using an application called OSSEC for monitoring my home network. The output of the application is primarily email alerts which are perfect for seeing events in near real-time. In this post, I’ll be showing you how to build a good high-level view of these alerts over time with Loki, Prometheus, and Grafana.

Reject fake users with Block Disposable Email

Disposable email addresses are temporary email addresses used for a short period of time. The use of disposable emails is quite controversial and they are widely used in online frauds. Hence, a large number of businesses need to block disposable email services to ensure they are dealing with genuine customers.

Multi-Cloud Security Myths

As multi-cloud architectures grow in popularity, more and more organizations will start asking how to secure multi-cloud environments. Some will conclude that a multi-cloud architecture requires a fundamentally different approach to cloud security. That’s one example of a myth about cloud security in a multi-cloud architecture. Let’s take a look at why this assumption is flawed, along with some other common myths about multi-cloud security.

Zooming in on UEBA: Answering the "what" and the "how"

User and entity behavior analytics (UEBA) is a relatively new category of cybersecurity tools that utilize machine learning (ML) algorithms to detect abnormalities in the behavior of the users and entities that belong to an enterprise network. UEBA monitors and continuously learns from the behavior of various user accounts and devices in the network, and establishes a baseline behavioral profile for each using statistical and probability models.