Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Enhance Security with Chainguard and Cloudsmith

At Cloudsmith, we are excited to announce our support for the Chainguard Registry as an upstream source. By consolidating all your artifacts, packages, and now Chainguard Images into Cloudsmith, your organization can: Integrating the Chainguard Registry as an upstream resource in your Cloudsmith account not only enhances security but also boosts efficiency in your artifact management workflow.

How to Remove Kaspersky Labs Software from Your Organization's Computers

Kaspersky Labs has long been recognized as a leading cybersecurity provider, but recent developments have prompted a reassessment of its software within organizational IT infrastructures. Growing concerns over its alleged ties to the Russian government have heightened due to stringent U.S. regulations, including those set forth by the Export Administration Regulations (EAR), the National Defense Authorization Act (NDAA), and the Federal Acquisition Regulation (FAR).

A Guide to Choosing the Right Identity and Access Management System for Your Business

Securing your business's data and managing user access is paramount. Identity and access management (IAM) systems are vital in this by ensuring that the right individuals access the right resources at the right times for the right reasons. With numerous IAM solutions available, choosing the right one for your business can be daunting. This guide will help you navigate through key considerations to make an informed decision.

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) is a type of cyberattack where attackers use email to exploit businesses by deceiving employees into transferring money or sensitive information. These attacks often involve impersonation of company executives or trusted business contacts to trick recipients into performing specific actions. As businesses become more reliant on digital communication, the threat of BEC grows, making it essential for organizations to recognize and mitigate these risks effectively.

Feature Friday #15: bundlesmatching()

Did you know bundles can have tags too? That’s right! You can tag a bundle by defining tags as a meta promise on a bundle. For example: You’ve likely encountered bundles tagged with autorun. These tags trigger automatic execution of bundles in lexical order whenever the services_autorun class is defined. However, you’re not limited to autorun. You can create custom tags to suite your specific needs.

#CyberDefense 101: Phishing + Credential Attacks | Security Insights Ep. 40

Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Innovating Security with Managed Detection & Response (MDR) and ChaosSearch

Managed Detection and Response (MDR) services occupy an important niche in the cybersecurity industry, supporting SMBs and enterprise organizations with managed security monitoring and threat detection, proactive threat hunting, and incident response capabilities.

10 Compliance Standards to Achieve IT Security And Privacy

Compliance standards are designed to create a robust framework that protects sensitive data from threat actors and ensures organizational integrity. Without them, organizations will be compromising both their IT security and privacy. If you are an IT manager, cybersecurity professional, legal advisor, or your employer has promoted you to be the new compliance officer, your aim is to ensure your organization's technology infrastructure meets regulatory requirements.

Cribl Copilot Accelerates Your Team's Efficiency in Managing IT and Security Data at Scale

Take off on Day 1 of your deployment with Cribl Copilot – your AI wingman – integrating Cribl’s portfolio with your data. AI-powered Cribl Copilot accelerates your productivity, activates the afterburners of your team’s efficiency, eliminates pilot error by closing the skills gap, and gives you a smooth landing of value with your Cribl Stream, Edge, Search, and Lake investment. It’s the fastest and easiest way to make the value of your Cribl data engine soar.