Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Sponsored Post

What's new in Avantra 24.2

It's my pleasure to announce the release of Avantra 24.2. The second update of Avantra 24, building upon 24.1 which brought performance and customer requested bug fixes, 24.2 brings new innovations and enhancements to our Avantra platform. With over 300 changes in our development management system, Avantra 24.2 feels like a major release to us and we have something new everywhere you look. Let's dive deeper into the new features.

Cyber Defense 202: Exploit Vulnerabilities | Security Insights Ep. 41

Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 in Chris' and Robert's hearts.

Feature Friday Feature Friday #20: Macros

Did you know CFEngine has Macros? They were first introduced in CFEngine 3.7 (back in 2015), and more have been introduced since then. Macros are convenient for preventing the parsing of a section of the policy. It is handy for protecting older binaries from getting tripped up on newer syntax the agent does not understand. Let’s take a look. Currently there are 8 macros. You can find examples of use within the Masterfiles Policy Framework.
Sponsored Post

Can the EventSentry Agents cause the same outage & disruption like the CrowdStrike Falcon sensor did?

The faulty Rapid Response Content CrowdStrike update that disabled millions of Windows machines across the globe on 7/19/2024 was any IT professional’s nightmare. Having to manually visit and restore each affected machine (further complicated by BitLocker) severely limited the recovery speed, especially for businesses with remote locations, TVs, kiosks, etc.

The Intersection of Identity Verification Services and Cloud Computing

In the digital age, identity verification has become a cornerstone of online security. With the rise of remote work, e-commerce, and online services, verifying the identity of users has never been more critical. Cloud computing, with its scalability, flexibility, and accessibility, has revolutionized how identity verification services operate, providing robust solutions to meet the growing demands of various industries. This article delves into how cloud computing enhances identity verification services and the benefits it brings to businesses and consumers alike.

Understanding Security Log Analytics vs. SIEM for Midsized Companies Targeted by Cybercriminals

SecOps teams at midsize companies face a unique set of challenges when it comes to managing organizational cybersecurity. Midsize companies (those with 100-999 employees and $50 million-$1 billion in annual revenue, according to Gartner) possess significant financial resources and valuable data that may be targeted by digital adversaries.

How to authenticate with third-party APIs in your Grafana app plugin

Whether they’re for synthetic monitoring, large-language models, or some other use case, Grafana application plugins are a fantastic way to enhance your overall Grafana experience. Data for these custom experiences can come from a variety of sources, including nested data sources. However, they can also come from third-party APIs, which usually require authentication to access.

What Is Remote Code Execution (RCE)?

Remote Code Execution (RCE) is when an attacker runs malicious code on your IT infrastructure. The purpose of RCE ranges from further infiltrating your network, stealing information, or otherwise damaging, extorting, or stealing from you or your business. Because of this, protecting your computers and network from RCE attacks is vital. This article explains what remote code execution is, and the impacts of RCE on your business.