Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Kubernetes run-time security: Automate Sysdig Falco deployment using Helm charts.

So, you want to implement run-time security in your Kubernetes cluster? If you are looking for an open-source tool, obviously Sysdig Falco is the way to go :). You can install Falco as a daemonSet, but as we wanted to make things even easier and natively integrated, we have packaged Falco as a Helm chart, the Kubernetes package manager.

Never postpone your product's security

If you ever (have to) ask yourself “When is the right time to address security issues?”, you’re already late to the party. Security isn’t that layer that you just add on top of your application before shipping it to production. Security is a mindset, that constant voice inside your head which asks “Is this safe?” each time you code something that pulls data out of storage or changes structures based on a user’s action.

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider when picking a solution.

Thoughts from Gartner's 2018 Security & Risk Management Summit

I always look forward to attending the annual Gartner Security & Risk Management Summit in National Harbor, Maryland. This event provides the latest insights from both Gartner and industry thought leaders, and is focused on many current challenges facing organizations today with key areas including agile architectures, business continuity management (BCM), cloud security, privacy and securing internet of things (IoT).”

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Organizations today are increasingly the targets of sophisticated threats developed by a shadowy and well-financed cybercrime industry that has demonstrated it can often outsmart even the most robust security defenses. Worse yet, cybercriminals are aided by the fact that security teams often lack the human and financial resources necessary to keep pace with evolving threats, so they often cannot defend against every attack coming their way.