Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Modernizing the Data Pipeline with Cribl - Aaron Wilson, iHerb & Jon Rust, Cribl

In the quest to turn our outdated and disorderly SIEM into a modern, streamlined and manageable solution, we turned to Cribl. Together we develop a centrally managed environment that empowered our teams to manage multiple data sources and destinations with improved time-to-value, reducing data flow steps, and increasing sustainability. Join this session to learn how we used Cribl to modernize and streamline our SIEM operations into a single point of management solution.

A CISO's comprehensive breakdown of the Cyber Resilience Act

Strong, wide-reaching regulation can bring safety to communities – but it can also bring uncertainty. The Cyber Resilience Act (CRA) has proven no exception to this universal rule. Across the open source community and the wider tech landscape, people have been greeting the news with the whole spectrum of reactions: concern, anxiety, hope. But is there anything to fear? Does the CRA really change things in open source? And how should your teams be preparing for this legislation?

Selecting and Implementing the Right MDR Solution for Your Customers

MSPs have a critical role to play in safeguarding SMBs and SMEs against cyber threats, and there are always tools coming onto the market to help you do this. In a recent interview for our Beyond the Horizons Podcast, Dave MacKinnon explored some of the key considerations MSPs should keep in mind when selecting a Managed Detection and Response (MDR) solution for their customers.

Practical Demo How Ivanti Maps to CIS Controls Version 8 #ivanti

The webinar introduces the Center for Internet Security (CIS) and its mission, focusing on how Ivanti solutions map to CIS controls. Demonstrations include Ivanti Neurons for External Attack Surface Management, Risk-Based Vulnerability Management, Patch Management, and Incident Response Management. The session also clarifies Ivanti's non-affiliation with CIS, the difference between VRS and VRR, and the integration of EASM with other Neurons products.

Why you NEED Runtime Security updated with Mike Coleman

Join Mike Coleman, Developer Advocate at Sysdig, as he explores the critical need for runtime security in cloud-native environments. Learn how the open-source tool Falco can help detect and respond to suspicious activities in your Kubernetes and container setups. This session covers the evolution of security practices, practical implementation tips, and a live demo. Perfect for developers, platform administrators, and security professionals looking to enhance their security posture.

Maximizing Cyber Resilience: Unifying Security and Recovery for More Seamless Defense

Your CISO’s top priority is to fortify your organization's security posture by closing vulnerabilities, disrupting attack chains and bolstering defenses. Yet, the challenge lies in harmonizing disparate security solutions across your organization’s network to develop a unified and proactive defense strategy.

Why BAC-PFN-GYP Fire Rated Access Doors Are Essential for Every Sustainable Building Project

In sustainable construction, addressing environmental concerns is just as important as ensuring the structural integrity of the building. BAC-PFN-GYP fire rated access doors provide a solution by combining functionality and sustainability into a single important building component.

Managing IT Network Disruptions In Your Company Like A Pro

Let's face it, tech meltdowns are the worst. In today's world, a healthy computer network is like the plumbing in your office-you barely notice it when it works, but when it goes kaput, everything grinds to a halt. Emails stop flowing, files disappear, and suddenly, your most productive employees are reduced to staring at useless screens. The good news? There are ways to be a hero and keep your business running smoothly even when the tech gremlins strike. This guide will show you how to be a network-disruption ninja, ready to tackle any tech trouble like a pro.