Operations | Monitoring | ITSM | DevOps | Cloud

September 2019

Yet another malware attack: macOS now the target for security attacks

Mac usage, as you’ve probably seen in your workplace, has risen exponentially in enterprises. According to a Jamf survey, 74 percent of those who previously used a PC for work experience fewer issues now that they use a Mac. Just like you’ve been watching the rapid rise of Macs in enterprises, so have attackers—the ones wreaking havoc in enterprises through malware attacks.

The life of a sysadmin: Encircled by excessive tools

It’s 3am, and you’re woken up by frantic calls and messages from users at your company—this is the everyday life of a sysadmin. Constantly surrounded by numerous tickets and persistent users who require immediate solutions, the life of a sysadmin is not a bed of roses. Their tasks are not limited to server management, maintenance, and repair, but also completely supporting a smoothly running production environment with minimal or no complaints from end users.

Five worthy reads: Infrastructure as Code, the single source of truth

From server setup and hardware configuration to application deployment, traditional end-to-end IT infrastructure management has high overhead and takes a lot of time and effort. With the advent of cloud computing, IT infrastructure has evolved to address the availability, scalability, and agility problems organizations face. Yet the issue of inconsistent configurations remains, because the manual setup of cloud infrastructure can still lead to discrepancies.

The Joker's in town. Time to secure your Android devices

Security experts from Google have discovered a new spyware in 24 Play Store apps that, combined, have more than 472,000 downloads. Researchers have stated that this spyware also has the capabilities of normal malware and appears to have infected certain apps in Google Play with more than 100,000 installations. Cybercriminals are deploying this spyware through the advertisement framework in those compromised apps.

Combating threats with UEBA: Health is wealth

In this four-part series, Combating threats with UEBA, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at unforeseen security attack scenarios, and discover how user and entity behavior analytics (UEBA) can be leveraged to safeguard organizations.