Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to Threat Hunt in Amazon Security Lake

Establishing a proactive security posture involves a data-driven approach to threat detection, investigation, and response. In the past, this was challenging because there wasn’t a centralized way to collect and analyze security data across sources, but with Amazon Security Lake it is much simpler.

Calico VPP: Empowering High-Performance Kubernetes Networking with Userspace Packet Processing

This is a guest post authored by Nathan Skrzypczak, R&D Engineer at Cisco. Calico VPP, the latest addition to Calico’s suite of pluggable data planes, revolutionizes Kubernetes networking by enabling transparent user-space packet processing. With features such as service load balancing, encapsulation, policy enforcement, and encryption, Calico VPP brings the performance, flexibility, and observability of VPP to Kubernetes networking.

Introduction to Endpoint Management: Definition, Benefits, and Tools

Endpoint Management is so inherent to IT that it is canon in this industry, especially now that remote work is the new normal. Setting a robust system is paramount for any organization that relies on digital devices. These devices are connected to the corporate network and can access its resources, so the goal is to ensure that these devices are secure, compliant with company policies, and operating efficiently.

Debunking Misconceptions About MDR

With the cybersecurity landscape evolving rapidly, Managed Detection and Response (MDR) has emerged as a major component for MSPs looking to safeguard organizations against increasingly sophisticated threats. However, despite its growing importance, there are still a number of misconceptions around the technology that can hinder its adoption. In this blog, we challenge some of these myths and highlight the significance of MDR in today’s IT environments, particularly for MSPs.

XZ Vulnerability

You drink tap water every day, right? Do you know who invented the filtering mechanism that makes water pure and clean?… Well, do you actually care? Do you know that this mechanism is exactly the same in all the taps of all the houses of any country? Do you know that this specialized piece is the work of an engineer who does it just because? Can you imagine what could happen if this person had a bad day?

Inventory and remediate Red Hat Enterprise Linux with Security Technical Implementation Guides (STIGs)

Security Technical Implementation Guides (STIGs) are an excellent body of knowledge to leverage in securing your infrastructure. With the stig-rhel-7 module you can easily add inventory and remediation policy for RHEL 7 with CFEngine. Do note that as of March 2024 this module does not provide comprehensive coverage but rather an initial 10 findings are implemented.

xz Backdoor: What to Know + What to Do About the XZ Utils Vulnerability

The xz backdoor is a vulnerability in XZ Utils, a popular data compression library. The xz backdoor can let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, who’s affected, and what you can do now to find out if your systems are at risk.

Feature Friday #3: execresult_as_data()

When you want to inspect both the return code and output from a command execresult_as_data() might be the function you are searching for. Most CFEngine policy writers have used execresult() and returnszero(). They are useful when you want to do something based on the output of a command or based on its successful execution (returning zero). For example: /tmp/feature-friday-3.cf command output But, sometimes, you care about specific return codes.

How to Manage Sensitive Log Data

According to Statistia, the total number of data breaches reached an all-time high of 3,205 in 2023, affecting more than 350 million individuals worldwide. These breaches primarily occurred in the Healthcare, Financial Services, Manufacturing, Professional Services, and Technology sectors. The mishandling of sensitive log data provides an on-ramp to many of the most common attack vectors.