Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Four Strategies for Securing the Tactical Edge

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information into soldiers’ hands more quickly, allowing them to make decisions in near-real time. But these benefits come with significant challenges, particularly regarding security. The more endpoints, the larger the potential attack surface and the greater the risk.

Kubernetes RBAC 101: Overview

Cloud native and open source technologies have modernized how we develop software, and although they have led to unprecedented developer productivity and flexibility, they were not built with enterprise needs in mind. A primary challenge is bridging the gap between cloud native and enterprise reality. Enterprises need a centralized Kubernetes management control plane with logging and monitoring that supports security and governance requirements extended through essential Kubernetes frameworks.

Monitoring AWS Fargate with Prometheus and Sysdig

In this article, we will show how it’s easily possible to monitor AWS Fargate with Sysdig Monitor. By leveraging existing Prometheus ingestion in Sysdig, you will be able to monitor serverless services with a single-pane-of-glass approach, giving you confidence in running these services in production.

Announcing record of remediation & audit logs in Puppet Remediate 1.3

Today we are pleased to announce the release of Puppet Remediate 1.3.0. This release includes new features requested by our customers, including even more capabilities to help you track and trace network activity, and give you more control of the data in your dashboard. Read on for background and a look at the new capabilities.

Announcing Graylog Illuminate for Authentication

Graylog Illuminate for authentication is a brand new offering designed by our Enterprise Intelligence team. It eliminates the manual setup necessary to detect, monitor, and analyze authentication activities and issues across your IT infrastructure by providing pre-built Dashboards, Alerts, and data enrichment. Initially, Graylog Illuminate for Authentication will address Windows authentication issues and activities. We will release additional data sources in the coming weeks so stay tuned!

Curtail security exploits in applications and fortify your remote endpoints

The trend of working from home has hit the ground running, and businesses have turned to strategies and tools that will ensure a no-plummet productive environment. There are two major forks in the road when it comes to provisioning remote endpoints—users can use their own devices, or the company can hand over corporate-owned devices.

Monitor Carbon Black Defense logs with Datadog

Creating security policies for the devices connected to your network is critical to ensuring that company data is safe. This is especially true as companies adopt a bring-your-own-device model and allow more personal phones, tablets, and laptops to connect to internal services. These devices, or endpoints, introduce unique vulnerabilities that can expose sensitive data if they are not monitored.

The Malicious Gocgle Campaign Targeting Customers' Payment Details

The COVID-19 virus epidemic has seen a 23% rise in visitors to UK independent ecommerce sites. On a global scale, many companies have transitioned to fully ecommerce-based business practices and are seeing an increase in online shoppers. This paradigm shift in business continuity means websites are increasingly vulnerable to being attacked.

Securing Azure Active Directory from PowerShell abuse

Malware attacks are evolving and once common tactics are becoming a thing of the past. Attack strategies, like using a third-party hacking program or injecting viruses from external sources, are almost obsolete as they leave a distinct footprint. Most antimalware tools can now detect the presence of a foreign program or device and immediately block them.