Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Five worthy reads: Privacy in pandemic management

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the data privacy challenges and concerns that have arisen during the COVID-19 pandemic. In the wake of COVID-19, the world has witnessed the power of technology.

Ways to Ensure App Security With Java Features

As important as adding new features, app developers need to start placing more emphasis on the security aspect of the applications they design. After all, more app features mean more data residing within an app. Without proper security controls in place, that data can be vulnerable to intruders.

Maximizing Your Splunk Investment: Introducing Splunk Lantern

Congratulations, you just bought Splunk! You made a great decision, and now it's time to start solving all those business problems on your plate. Maybe you are trying to reduce the time spent managing cyber risks from hours to minutes. Or you might be executing a digital transformation of your customer experience. Or perhaps you are trying to save $70 million dollars in an IT consolidation project. But you have just one question: how?

4 Reasons Why IT Risk Detection is Critical in the Service Desk

In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in the service desk can act as a safeguard to avoid this. It can help notify service technicians of “prohibited” or questionable items that could cause problems. Here are four reasons why IT risk detection should be incorporated and is critical for successful use of the service desk.

CFEngine in a High Performance Computing environment

In High-Performance Computing (HPC) uptime and performance are very important. HPC is an area of computing that often focuses on research and development, supporting teams with extremely complex problems they need to solve, and heavy computation mathematical problems, such as protein folding for vaccine development. To achieve this, HPC systems rely on high performance, the equipment is expensive, and the average customer has very high demands.

New and improved dashboards: PromQL, Teams sharing, and more!

To accompany Sysdig’s announcement of the first cloud-scale Prometheus monitoring offering, we had to re-architect our dashboarding experience from the ground up to support the Prometheus query language, PromQL. The query language is the standard method to query metrics within the ecosystem, and it’s an entirely new way to slice and dice metrics within Sysdig Monitor.

Kubernetes Security: Lateral Movement Detection and Defense

What is Lateral Movement? Lateral movement refers to the techniques that a cyber-attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets. Lateral movement techniques are widely used in sophisticated cyber-attacks such as advanced persistent threats (APTs).

Why Zero Trust in IAM is the new way forward

The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind the corporate firewall is safe. However, it’s clear that organizations have to rethink the philosophy of implicit trust in a corporate network.

DIY Tool Website Greenworks Hacked by Self-Destructing Web-Skimmer

Whilst researching recent client-side attacks our security team observed a highly-sophisticated self-cleaning and self-destructing skimmer on the popular hardware tool website Greenworks. The hack was first spotted by RapidSpike’s Client-Side Security Scanner on June 8th, and at the time of writing, the hack is still live on www.greenworkstools.com/.