Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Sponsored Post

5 Security Logging and Monitoring Mistakes to Avoid

As cybersecurity attack vectors evolve, security logging and monitoring are becoming even more important. Effective logging and monitoring enables organizations to detect and investigate security incidents quickly. Cloud-based attackers are getting more sophisticated, and often rely on stolen credentials to escalate privileges and move laterally within corporate IT networks. Many do so undetected, which is why modern IT systems require a watchful eye on log data to detect suspicious activity and inform incident response efforts.

Understanding Network Management Services: Key Components and Benefits

Network management plays a vital role in the modern IT structure, it is a range of toolkits and applications designed to maintain and improve the online community. Network management services ensure that the network operates smoothly and supports continuous data transmission and interchange within corporations.

Dynamic Priorities: Attack Surface Management, Rex McMillan, VP Product Management, Ivanti #goivanti

Ivanti’s Attack Surface Management report examines the challenges of monitoring and managing expanding attack surfaces and provides strategies directly from IT and security experts into how you can practice comprehensive attack surface management. In this video, Rex McMillan, Vice President of Product Management at Ivanti, shares valuable insights on attack surface management (ASM) and why an attack surface management solution should empower organizations to detect and prioritize high-level risks even as those risks evolve in scope and severity.

Feature Friday #16: host info report

Did you know the Masterfiles Policy Framework (MPF) ships with a host info report? That’s right, you can simply run cf-agent --bundlesequence host_info_report and a report will be generated. command output It’s packed with information about the specific host. Let’s peek: command output Here are the section headers: command output Running with the show_software class defined will add information about installed packages command output command output Happy Friday!

Data Privacy Takeaways from Gartner Security & Risk Summit

A couple of weeks back, I had the opportunity to participate in the Gartner Security and Risk Summit held in National Harbor, MD. While my colleague, April Yep, has already shared insights on the sessions she attended, this blog will delve into the emerging data privacy concerns and explore how telemetry pipelines can effectively tackle these challenges. Two key drivers behind current privacy concerns are the adoption of Gen AI and increasing government regulations.

What Is the National Vulnerability Database?

The National Vulnerability Database (NVD) is an information resource provided by the U.S. government that catalogs security vulnerabilities in a standardized, searchable format. It includes databases containing software and hardware products, their known security flaws (including misconfigurations), as well as their severity and impact. The NVD is an important resource for IT professionals to stay up-to-date with potential security concerns in their IT infrastructure.

How to Close Attack Surface Gaps, Daren Goeson, SVP Product Management, SUEM, Ivanti #goivanti

For more valuable insights on reducing an organization's attack surface, check out Ivanti’s Attack Surface Management Report. Daren Goeson, SVP of Product Management, SUEM, Ivanti shares valuable insights on reducing an organization's attack surface and implementing an effective Attack Surface Management (ASM) strategy. From asset discovery to vulnerability management, risk assessment to automation, this video provides essential guidance for organizations to enhance their cybersecurity posture.

Data Harmonization is Key to Reduce Your Attack Surface, Srinivas Mukkamala, CPO, Ivanti #goivanti

Ivanti’s Attack Surface Management report offers more expert advice on how to turn actionable data into a mature and effective attack surface management strategy. Dr. Srinivas Mukkamala, Ivanti CPO, discusses the need for organizations to consolidate and harmonize data from multiple sources to gain a comprehensive view of their attack surface. This video offers actionable advice on how to structure, analyze and apply your data to use it to inform your attack surface management strategy and quickly and effectively detect and remediate threats.

How NDR Tools Integrate Automation and Orchestration

Connectivity is paramount today for convenience, efficiency, and productivity. Our devices are interconnected in our homes and offices from the moment we walk through the door. From laptops and mobile phones to smart devices and printers, we often rely on a single network connection to keep everything running smoothly.