Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Understanding RBAC in Sensu Go

Regulating access to resources is a fundamental measure for enterprises to ensure the security and reliability of a system. The last thing you need is a stolen or weak password to give up the keys to the proverbial kingdom. With role-based access control (RBAC), this risk is mitigated by providing only the necessary access so a user in your organization doesn't have more access than needed.

The Top 5 Open-Source NIDS Solutions

In a hyper-connected world, the threat landscape is undoubtedly evolving. Ensuring the security of your enterprise networks on a daily basis is essential to protect your business, no matter how big (or small) it is. According to SophosLabs’ 2019 threat report, one dangerous ransomware called SamSam cost companies $6.5 million ($10K to $50K per ransom).

What the US Government Can Teach You About Securing SolarWinds

SolarWinds has many customers who require a monitoring solution that's robust, reliable, and safe, but probably none as much as the many areas of the U.S. Federal Government who use our tools. That said, we know that security is EVERYONE'S concern these days, and the Systems Engineers who work with our Federal customers have a lot to teach organizations of all shapes, sizes, industries, and even nationalities.

DevOps vs. Compliance: A Guide to Having it All

Atlassian product teams use a blend of agile and DevOps practices. But there are still SOX and ISO compliance standards to meet when it comes to change management. What's a modern dev team to do? Join Guy Herbert, Atlassian's IT compliance lead as he shows how we combine peer review and build testing with a new approach to compliance in order to deliver customer value quickly while meeting our compliance obligations.

Announcing the Sysdig Cloud-Native Visibility + Security Platform 2.0

Today we’re announcing version 2.0 of the Sysdig Cloud-Native Visibility + Security platform. It provides a more powerful and significantly simpler way for enterprises to see the health, risk, and performance of their cloud-native environments in a single unified view.

What is AWS GuardDuty

AWS is the most popular cloud platform for enterprises, and with good reason. Amazon has massive infrastructure around the world, and many years of experience with it. Whether your network is completely on the cloud or you have a hybrid network, using AWS saves your business a lot of money and physical space. You benefit from Amazon’s tremendous economies of scale, and a lot of the tedious work involved in maintaining a network can be delegated to them.

Linux Security Guide: How to Investigate Suspected Break-in Attempts in Linux

Scenario Linux has a number of built-in tools, commands and files which can track and store information about every user activity. These tools are common in most Linux distributions and can be used to investigate suspicious logins or failed login attempts into the system. In this article, we will talk about some of the initial methods to identify possible security breaches. We will use an Amazon EC2 instance to show these commands.

What Your Kubernetes Security Checklist Might Be Missing

New technologies often require changes in security practices. What is remarkable about containers and Kubernetes, is that they also provide the potential for enhancing and improve existing security practices. In this post, I will share a model that we use at Nirmata to help customers understand security concerns and plan Kubernetes implementations that are secure.