Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of creating and enforcing a solid cybersecurity strategy for employees who work remotely.

Top 5 security challenges with Zoom video conferencing

In times when a majority of employees are working from home due to the global coronavirus pandemic, enterprises are extensively relying on collaboration tools like Zoom to keep their employees productive and engaged. Only in March, the daily usage of Zoom Videos increased over 5 times. The platform made it easy for company employees and clients to hop on meetings whenever needed and for schools and students to continue education online.

CIS hardened Ubuntu: cyber attack and malware prevention for mission-critical systems

The Center for Internet Security (CIS) is a nonprofit organisation that uses a community-driven process to release benchmarks to safeguard enterprises against cyber attacks. It is one of the most recognised industry standards that provides comprehensive configuration checklists to identify and remediate security vulnerabilities in a computing environment.

Identity Guard: Identity Theft Protection Tool

Identity theft is on the rise and it is not enough to simply stay on top of the latest trends in this arena to avoid falling victim to common cons; you need to be proactive to prevent sensitive information being stolen and used against you. This is where Identity Guard’s identity theft protection tool comes into play. It aims to deliver always-on protection from the biggest threats faced by innocent web users.

Blocking USB Drives For Work From Home Employees

With so many people working from home, the perimeter of corporate data safety has suddenly grown very large, in many cases encompassing employee home computers. Data loss prevention (DLP) was challenging enough already, but now it takes on even more importance. One way that data can escape the corporate network is by getting copied to USB thumb drives. Some companies take the approach of gluing or epoxying the USB ports closed.

What Is User Activity Monitoring? Learn the What, Why, and How

What do you think is the most important aspect of a company? Performance? Perhaps you’re thinking of profits. True, performance and profits are crucial. But security tops the list. Every company caters to different users regularly. But does the necessity of security change whether the user base is narrow or wide? Users have access to a lot of information, and often, this leads to the risk of unauthorized access and data breach.

SQL Server, Part 1: Why you should monitor SQL logs

Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the top most targeted assets for malicious actors to exploit organizations’ confidential data. Often, organizations don’t realize their databases have been compromised for months. Once sensitive data is leaked, the damage can’t be undone.

Hardening Windows security: How to secure your organization - Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game. Living-off-the-land attacks, or LOTL, is one clear trend today, with attackers exploiting preinstalled features and default tools built into system.

Securing Tekton pipelines in OpenShift with Sysdig

In this blog post, you’ll learn how to create a reusable Sysdig Secure image scanning task, for Tekton pipelines and Openshift clusters, that can be deployed in many pipelines. As a DevOps engineer, you want to deliver applications fast but keeping compliance with security standards like CIS, PCI DSS or NIST 800-190, GDPR can be an arduous task. You might implement image scanning in your CI/CD pipelines to detect and resolve issues such as known vulnerabilities and incorrect configurations.