Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The Value of Threat Intelligence Automation

The news is full of stories about the talent shortage in IT, especially in IT security. This shortage has created pressure on organizations to grow IT operations and to do that securely, all while having too few staff. Many are turning to threat intelligence to give their security analysts the tools they need to evaluate threats quickly and effectively. Essentially offering “Intelligence as a Service,” these tools enable organizations to benefit from the research of others.

The Data Explosion and its Effect on Security

Data is exploding. The shift to digital business is driving a massive expansion in the volume of data that organizations produce, use, and store. It is also accelerating the velocity of data—that is, the data is changing more rapidly than ever before. Which in many ways is great—more data can bring more insight into customers, markets, and opportunities. But more data can also be a problem.

EventSentry SysAdmin Tools: Digital Signature Verification with checksum.exe

Windows supports a code-signing feature called Authenticode, which allows a software publisher to digitally sign executable files (e.g. .exe, .msi, …) so that users can verify their autenticity. The digital signature of a file can be viewed in the file properties in Windows explorer on the “Digital Signature” tab.

Status.io and GDPR

We’re just a few months away from mandatory compliance with GDPR. The European General Data Protection Regulation (GDPR) replaces the EU National Data Protection legislation and is due to take effect in May 2018. The GDPR is a new regulation to protect personal data of EU citizens. It affects all organizations (even outside of the EU) that process data of EU citizens. In our previous article “Preparing for the GDPR”, we shared some resources for learning more about the GDPR.

Vulnerability Scanning with RapidSpike

The latest addition to the ever growing Security Monitoring tools from RapidSpike is the ability to perform Vulnerability Scans of your external facing servers and web applications. Cyber Security is a massive area of concern for every website or web application owner and ensuring that your applications and servers are free from vulnerabilities is critical in ensuring the ongoing availability of your service.

Five worthy reads: Machine learning, the next phase of cybersecurity

With the number of cyberattacks growing with each passing day, the need for increasingly sophisticated security systems has never been higher. Just when these ceaseless attacks had you at your wit’s end, machine learning may just restore some sanity to the cybersecurity scene.