Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

2018: A look back at what we've done in ITOM

2018 was a busy year for the ManageEngine IT operations management team. We tackled everything from major concerns like poor network performance, security, cost, enterprise growth, configuration management, and vendor lock-in to enterprise-specific issues such as providing uninterrupted connectivity to critical apps and departments, managing BYOD policies, and predicting future bandwidth needs.

The relationship between steganography and cyberattacks

There’s no denying the importance of communication. Businesses cannot function without the proper means of communication, such as phone calls, faxes, emails, text messages, and more. However, not all forms of communication are secure, meaning the information transferred by them doesn’t always stay confidential. This is where steganography comes into play.

IT in 2018: A ManageEngine retrospective

2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the processor bugs Meltdown and Spectre. From there, the year was filled with data breaches and ransomware. But things weren’t all bad this year; the GDPR went into effect, which is a huge step forward in data privacy, and plenty of new technologies were released.

Cyber Security in the Movies - Is It Realistic?

Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security system.

Building confidence via automated container security scanning - Xavier Vello - DockerCon EU 2018

Container image security scanners are one of several tools we use in our development process to ensure the software that we ship to our customers is reliable and safe. In this talk, we’ll discuss our approach to continuous vulnerability monitoring (spoiler: it’s all automated), and how it increases our responsiveness while decreasing our operational cost.

Integrating Sysdig Secure with Atlassian Bamboo CI/CD

In this blog post we are going to cover how to perform Docker image scanning on Atlassian’s Bamboo CI/CD platform using Sysdig Secure. Container images with security vulnerabilities or not compliant with the security policies that you define within Sysdig Secure will be stopped, breaking the build pipeline before being pushed to your Docker registry.