Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What Is User Activity Monitoring? Learn the What, Why, and How

What do you think is the most important aspect of a company? Performance? Perhaps you’re thinking of profits. True, performance and profits are crucial. But security tops the list. Every company caters to different users regularly. But does the necessity of security change whether the user base is narrow or wide? Users have access to a lot of information, and often, this leads to the risk of unauthorized access and data breach.

SQL Server, Part 1: Why you should monitor SQL logs

Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the top most targeted assets for malicious actors to exploit organizations’ confidential data. Often, organizations don’t realize their databases have been compromised for months. Once sensitive data is leaked, the damage can’t be undone.

Hardening Windows security: How to secure your organization - Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game. Living-off-the-land attacks, or LOTL, is one clear trend today, with attackers exploiting preinstalled features and default tools built into system.

Securing Tekton pipelines in OpenShift with Sysdig

In this blog post, you’ll learn how to create a reusable Sysdig Secure image scanning task, for Tekton pipelines and Openshift clusters, that can be deployed in many pipelines. As a DevOps engineer, you want to deliver applications fast but keeping compliance with security standards like CIS, PCI DSS or NIST 800-190, GDPR can be an arduous task. You might implement image scanning in your CI/CD pipelines to detect and resolve issues such as known vulnerabilities and incorrect configurations.

Keep your Network Secure and Running for Home Office Users

Just like many companies in these trying times, we too have asked many of our employees to work from home to protect their health. As a consequence, our network traffic characteristics have changed dramatically. In this webinar, we would like to share our experience with three of the most concerning issues we’ve come across to ensure a productive and safe workplace for home office employees. Pavel Minarik, Flowmon’s CTO will explain, and show live, how we secured sufficient VPN bandwidth, managed our uplink utilization and minimized risks introduced by personal assets.

File shadowing: The key to a swift recovery from USB and file-based attacks

USB devices are undeniably valuable, but they can be dangerous. On one hand, they are useful in transporting enterprise-critical data, but on the other, they can wreak havoc if misplaced, corrupted due to a human or hardware-related error, or stolen. It’s no wonder some companies forbid the use of USB devices altogether.

Privacy Protections, PCI Compliance and Vulnerability Management for Kubernetes

Containers are becoming the new computing standard for many businesses. New technology does not protect you from traditional security concerns. If your containers handle any sensitive data, including personally identifiable information (PII), credit cards or accounts, you’ll need to take a ‘defense in depth’ approach to container security. The CI/CD pipeline is vulnerable at every stage, from build to ship to runtime.

Falco Support on AWS Fargate

Today we’re very excited to announce a partnership with Amazon to support Fargate in Sysdig’s product line. We are also announcing that Falco, the world’s most popular runtime security tool for containers, will soon be able to work on Fargate. This is an important milestone. For the first time, Fargate users will enjoy the benefit of deep instrumentation. This will make their workloads more secure, reliable, and efficient.

What Makes SSL Fail, and What Can SREs Do About It?

TLS (and the previously used SSL) protocols make the web go round. They are fundamental when establishing a link between two computers, creating a very special mathematical relationship signified by the all-encompassing gesture of friendship: the handshake. So fundamental, in fact, that we probably take them for granted when we shouldn’t. The user relies on TLS encryption every day to protect data and the integrity of a session.