Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Prevent DNS (and other) spoofing with Calico

AquaSec’s Daniel Sagi recently authored a blog post about DNS spoofing in Kubernetes. TLDR is that if you use default networking in Kubernetes you might be vulnerable to ARP spoofing which can allow pods to spoof (impersonate) the IP addresses of other pods. Since so much traffic is dialed via domain names rather than IPs, spoofing DNS can allow you to redirect lots of traffic inside the cluster for nefarious purposes.

Monitor system access and unusual activity with Okta logs and Datadog

Okta is a cloud-based identity management service that provides authentication and authorization tools for your organizations’ employees and users. You can use Okta to incorporate single sign-on, multi-factor authentication, and user management services right into your applications.

Custom HTTP Request Headers

One of the latest under-the-hood upgrades to our User Journey and Page Performance monitoring system has been to introduce the ability to set custom HTTP request headers. This was actually a requirement from one of our clients who was beginning to have trouble maintaining the whitelist of IP addresses that our requests might come from in their Web Application Firewall (WAF).

A Guide to Protecting Privacy in the 21st Century

Let’s be honest: we are facing big problems surrounding privacy online today. It has come to light over the past couple of years how the adtech industry harvest and abuse user data to construct eerily detailed profiles on individuals, in order to sell these in real time bidding auctions to online advertisers, who out-bid each other for the opportunity to serve users individualized marketing in the micromoments, they visit a website.

Magecart Monthly: Sporting Sites New Prime Target for Magecart

The sports market has suffered a host of cybersecurity problems from FC Barcelona Twitter account being hijacked to the FIFA data breach. Now Magecart are taking advantage of cybersecurity patches. We discuss the latest Magecart victims and the reasons why so many sports websites fall under attack.

Security Strategies for Mitigating IoT Botnet Threats

As DevSecOps continues to redefine the IT security landscape, security is becoming everyone’s responsibility. That means that staying ahead of the latest cybersecurity threats—such as IoT botnets—should be a priority for every DevOps professional. To help you do that, this article discusses strategies for combating IoT botnets.

Falco in the open

One of the most successful aspects of Kubernetes is how functional the open source community was able to operate. Kubernetes broke itself down in smaller sections called special interest groups, that operate similarly to subsections of the kernel. Each group is responsible for a single domain, and sets their own pace. One of the most important things to a Kubernetes SIG, is the residual SIG calls.

Enhancing Support for Zeek (Bro) in Logz.io Security Analytics

We’re happy to announce official support for Zeek in Logz.io Security Analytics for easier security monitoring! Logz.io Security Analytics provides a unified platform for security and operations designed for cloud and DevOps environments. It’s built on top of Logz.io’s enterprise-grade ELK Stack and is extremely easy to set up and integrate with.

Sumo Logic Helps ABinBev Modernize its Security Operations Center

What do beer and data analytics have in common? Learn how iconic beer vendor Anheuser Busch in Bev (ABinBev) relies on Sumo Logic to give them real-time security insights into their global security operations center (SOC) and helps showcase the value of security within the organization through dashboards and metrics.