Operations | Monitoring | ITSM | DevOps | Cloud

Yet another malware attack: macOS now the target for security attacks

Mac usage, as you’ve probably seen in your workplace, has risen exponentially in enterprises. According to a Jamf survey, 74 percent of those who previously used a PC for work experience fewer issues now that they use a Mac. Just like you’ve been watching the rapid rise of Macs in enterprises, so have attackers—the ones wreaking havoc in enterprises through malware attacks.

The life of a sysadmin: Encircled by excessive tools

It’s 3am, and you’re woken up by frantic calls and messages from users at your company—this is the everyday life of a sysadmin. Constantly surrounded by numerous tickets and persistent users who require immediate solutions, the life of a sysadmin is not a bed of roses. Their tasks are not limited to server management, maintenance, and repair, but also completely supporting a smoothly running production environment with minimal or no complaints from end users.

Five worthy reads: Infrastructure as Code, the single source of truth

From server setup and hardware configuration to application deployment, traditional end-to-end IT infrastructure management has high overhead and takes a lot of time and effort. With the advent of cloud computing, IT infrastructure has evolved to address the availability, scalability, and agility problems organizations face. Yet the issue of inconsistent configurations remains, because the manual setup of cloud infrastructure can still lead to discrepancies.

The Joker's in town. Time to secure your Android devices

Security experts from Google have discovered a new spyware in 24 Play Store apps that, combined, have more than 472,000 downloads. Researchers have stated that this spyware also has the capabilities of normal malware and appears to have infected certain apps in Google Play with more than 100,000 installations. Cybercriminals are deploying this spyware through the advertisement framework in those compromised apps.

Combating threats with UEBA: Health is wealth

In this four-part series, Combating threats with UEBA, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at unforeseen security attack scenarios, and discover how user and entity behavior analytics (UEBA) can be leveraged to safeguard organizations.

Five worthy reads: Embracing the era of everything-as-a-service (XaaS)

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into the increasing adoption of XaaS models across enterprises to achieve agility, pervasive automation, and digitization of business verticals.

Zooming in on UEBA: Answering the "what" and the "how"

User and entity behavior analytics (UEBA) is a relatively new category of cybersecurity tools that utilize machine learning (ML) algorithms to detect abnormalities in the behavior of the users and entities that belong to an enterprise network. UEBA monitors and continuously learns from the behavior of various user accounts and devices in the network, and establishes a baseline behavioral profile for each using statistical and probability models.

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to their use, or rather misuse, of legitimate credentials, machines, and access privileges. Traditional SIEM solutions use simple rule-based alerting to detect potential insider threats, which cannot analyze user behavior or detect any anomalies therein.

User and entity behavior analytics: The intelligent guardian of your business

Identities are easy to fake, but not actions. Closely monitoring the behavior of a person can reveal a lot about their true intentions. Similarly, keeping a close watch on a machine’s activities can expose potential security problems. Blending security information and event management (SIEM) with user and entity behavior analytics (UEBA) can bring numerous users and devices belonging to an enterprise under surveillance.