Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Kubernetes Network Policy Introduction

Kubernetes Network Policy is the native way to implement network security controls in Kubernetes. Calico Policy is a superset of Kubernetes Network Policy that adds additional capabilities that help meet common real-world use cases. In this talk, we will educate you on the basics of Kubernetes Network Policy, the differences with Calico Policy, example use cases, and demos. You’ll walk away from this session with knowledge that will help you decide which network policy is right for you.

Early Ransomware Detection and Response

The inability to access critical digital assets can be catastrophic to your operations. Ransomware is therefore one the scariest, but also most common online assaults. Join this webinar and learn how Flowmon, a leading network detection and response tool, helps to cover visibility gaps, detect ransomware and respond even prior to locking down digital assets. We will go through Flowmon's features via live demo and show you how to trace attackers’ footprints across the system.

Data Security and Privacy Techniques for Everyone

Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to protect their data. If you’re online in any capacity, there are some basic techniques you should use. I’m not talking about things like encryption and data masking; if I tried to tell my mother about those, she would stare blankly at me.

Survey: Remote Work Leads to Increase in Security Issues

Over the past several months, the world has changed as we know it. The COVID-19 pandemic has transformed the way many companies do business, with more virtual events, video calls, and curbside pickups than ever before. Although challenging at times—we miss attending live events and other social activities—this pandemic has forced many companies to think outside of the box. The traditional ways of doing business were no longer feasible or even legal in some cases.

I Can See Securely Now

Pretty much every organization of any size is paying close attention to the adoption of security practices in order to manage and protect their most sensitive data, including personal identifiable information (PII), personal health information (PHI), or other customer and financial data. For any team using SaaS tools, data protection is a table-stakes requirement. For compliance regulated industries — banking, financial services, healthcare.

Integrate your IDS + monitoring with the Sensu Tripwire asset

Tripwire, created by our friend Gene Kim, is a popular intrusion detection system (IDS) with both commercial and open source offerings. As a fun side project, I put together a Tripwire asset for Sensu. While this is more a prototype than anything else, I wanted to take this opportunity to offer some background on IDS, Tripwire, and integrating intrusion detection into your monitoring workflow, with the overall aim of illustrating how easy it is to deploy solutions with Sensu.

Orchestration and Automation Helps Defense, Intelligence Personnel Tackle Higher-Level Tasks

What if you could get your hands on a force multiplier that got rid of the repetitive, routine work that was tying down your team, got more productivity out of your assembled work force, and gave everyone a more challenging, meaningful to-do list that made better use of their knowledge, experience, and passion?

Threat Hunting with Elastic APM

Learn how APM lets you monitor the performance of applications deployed anywhere within your network. Now you can use APM data to hunt for threats and injection attacks, too. Elastic provides a common data platform so you can view HTTP data collected with your APM agents in the Elastic SIEM app. It’s seamless monitoring and protection to keep your systems up, running, and secure.