Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Inline Image Scanning for AWS CodePipeline and AWS CodeBuild

In this blog post you’ll learn how to set up image vulnerability scanning for AWS CodePipeline and AWS CodeBuild using Sysdig Secure DevOps Platform. AWS provides several tools for DevOps teams: CodeCommit for version control, CodeBuild for building and testing code, and CodeDeploy for automatic code deployment. The block on top of all these tools is CodePipeline that allows them to visualize and automate these different stages.

Sysdig extends security across all AWS container services

Cloud teams are increasingly adopting AWS container services to deliver applications faster at scale. Along with the roll out of cloud native architectures with containers and orchestration, what’s needed to stay on top of the security, performance and health of applications and infrastructure has shifted. At Sysdig, we’ve worked with Amazon to provide tools and integrations that help secure your Cloud Native workloads deployed across all AWS container services.

Machine learning for cybersecurity: only as effective as your implementation

We recently launched Elastic Security, combining the threat hunting and analytics tools from Elastic SIEM with the prevention and response features of Elastic Endpoint Security. This combined solution focuses on detecting and flexibly responding to security threats, with machine learning providing core capabilities for real-time protections, detections, and interactive hunting. But why are machine learning tools so important in information security? How is machine learning being applied?

Dear Search Guard users #2, including Amazon Elasticsearch Service and Open Distro, and others

Back on September 4th, we filed a lawsuit against floragunn GmbH, the makers of Search Guard, a security plugin for Elasticsearch and Kibana, for a multi-year pattern of copying our proprietary code. After filing the claim, we have continued to investigate floragunn’s actions. Today, we have updated our lawsuit in two important ways. First, we have identified additional copying by floragunn with respect to the separate, proprietary code base for our Kibana product.

Mitigating cyberthreats in 2020: A unified approach to endpoint security

Unsecured endpoints can cause catastrophic incidents that threaten an organization’s security and reputation. The ability to identify, preempt, and thwart breaches at the device level is critical to your organization’s security posture. In this webinar, you will learn about major attacks of the past, vulnerabilities that led to these attacks, and how to build a proactive shield against them.

Announcing Datadog Security Monitoring

With the growing complexity and velocity of security threats in dynamic, cloud-native environments, it’s more important than ever for security teams to have the same visibility into their infrastructure, network, and applications that developers and operations do. Conversely, as developers and operations become responsible for securing their services, they need their monitoring platform to help surface possible threats.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.

Secret Keys to the Password Kingdom

Building trust with customers is a must for MSPs. And because of the unique nature of MSPs, it’s not always easy. Your customers aren’t simply giving you administrative access to a few admin accounts—they’re sharing secrets which must be securely managed across all the systems, apps, and users you manage for them. Passwords, SSH keys, licenses, cloud infrastructure logins, and SaaS portal accounts are just the beginning. To solve issues quickly, your technicians can’t waste time locating the credentials needed to resolve issues and make users happy.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.