Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Security vulnerability uncovered and patched in the golang.org/x/crypto /ssh package

Platform.sh teams are always striving to ensure a safe space for all developers within our product. And this consistent diligence led to the Platform.sh Engineering team discovering a security vulnerability in the golang.org/x/crypto/ssh package on 5 September 2024. Upon investigating an unexpected Panic: runtime error: invalid memory address or nil pointer dereference message in our edge proxy, the engineers discovered a misimplementation of the PublicKeyCallback function.

Feature Friday #40: What would CFEngine do?

CFEngine works by defining a desired state for a given context and converging towards that goal. Given there is no fixed starting point and that the current context might change wildly it can be challenging to succinctly answer the question “What would CFEngine do?”. In Feature Friday: Don’t fix, just warn we saw how an individual promise could be made to warn instead of trying to automatically converge towards the desired state, a granular --dry-run mode.

Passwordless Authentication: Its Role in IT Service Management and Observability

Efficiency and security are critical to observability and IT service management (ITSM) in the digital era. Passwordless authentication is revolutionizing how businesses carry out these crucial functions by providing a seamless yet incredibly safe approach to access management. The integration of these technologies is essential for enhancing cybersecurity and streamlining processes in increasingly complex IT systems.

How to Identify GDPR Compliance Gaps to Protect Your Business

With the introduction of the General Data Protection Regulation (GDPR) in 2018, businesses across Europe and beyond have faced the complex task of ensuring compliance. The regulation was designed to provide individuals greater control over their personal data, thereby imposing stringent obligations on organizations that handle such data. Failing to comply can lead to hefty fines, reputational damage, and loss of customer trust. That's why businesses must proactively identify and close compliance gaps to mitigate these risks effectively. Let's dive into it.

Indicators of Compromise (IoCs): An Introductory Guide

To confirm cyberattack occurrences and build or enhance cyber-defense strategies, threat intelligence teams use a lot of information, including Indicators of Compromise (IoCs). These IoCs are actually forensic data that are critical in: The relevance of IoCs cannot be downplayed, but they're not all that’s needed in building an effective cybersecurity strategy. In this article, we’ll explore indicators of compromise, their types, and their relevance to threat intelligence teams.

Why website monitoring is essential for building digital trust

Your website: it's where your customers connect with you. It's the digital embodiment of your brand, the 24/7 ambassador communicating your value and building crucial relationships. But what if that vital communication channel breaks down? Slowdowns, outages, and especially security breaches can instantly erode customer trust, inflicting lasting damage on your reputation and revenue.

How to Protect Your Security Cameras From a Cyberattack

Security cameras are a crucial part of keeping homes and businesses safe. They offer peace of mind, capturing everything from mundane moments to critical security events. But here's the thing: these cameras, especially when connected to the internet, can be vulnerable to cyberattacks. Hackers love a good weak spot, and unfortunately, poorly secured cameras often fit the bill.

What is SBOM? Software bill of materials explained

In the wake of EU drafted legislation and US executive orders, a software bill of materials (SBOM) has gone from a nice-to-have to a fundamental piece of software documentation. In this article, we’ll examine what an SBOM is, what information it must include, and the approaches that developers and manufacturers alike should consider as they start building their SBOM.