Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Database Monitoring and Security Go Hand in Hand

A comprehensive strategy for monitoring your database estate should go beyond performance metrics like CPU usage, memory consumption, and IO performance. This article explains a unified approach using Redgate Monitor, which will collect performance and security data side by side across all databases and servers, whether on-premises, cloud-hosted, or both.

See what services are running on your hosts

This series of blogs, Monthly Module Mondays, started on April Fool’s Day 2024 discussing how to Inventory and remediate Red Hat Enterprise Linux with Security Technical Implementation Guides (STIGs) has now reached the 10th installment showcasing a couple of modules to take stock of what services are running on your systems.

Magecart Attack: 'Temporarily Out Of Orbit'

In December 2024, it was reported that the European Space Agency’s (ESA) official online store suffered a Magecart attack aimed at compromising customers’ payment information. The breach involved the injection of malicious JavaScript code into the store’s checkout process, leading to the display of a counterfeit Stripe payment page designed to harvest sensitive data. Image Source: ESA Website.

Proactive Protection with Exposure Management | Security Insights, Ep. 46

Ivanti's Robert Waters welcomes Grand Bank CTO Robert Hanson for a wide-ranging conversation on the emerging field of exposure management and how you can proactively safeguard your organization, because every organization faces risk. What separates the vulnerable from the well-protected isn’t whether you have exposure — it’s how you manage it. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

The Ultimate Guide to the Best SFTP Servers in 2025

Secure File Transfer Protocol (SFTP), also known as SSH File Transfer Protocol, is a robust, encrypted method for transferring files across networks, designed as a more secure alternative to traditional File Transfer Protocol (FTP). Essential for industries handling sensitive data—like finance and healthcare—SFTP protects against unauthorized access and enables efficient file management, making it a critical tool for remote access and data protection.

5 Best Practices for Managing Risk When Trading Cryptocurrency

Cryptocurrency trading offers lucrative opportunities but comes with significant risks due to the market's inherent volatility. Price swings are frequent, and even promising investments can decline unexpectedly, emphasizing the importance of risk management. With Bitcoin ETFs approved and the 2024 Bitcoin Halving, the market is entering a pivotal and exciting phase. A potential bull run could finally boost global adoption, making crypto a cornerstone of financial evolution.
Sponsored Post

Capturing Network Traffic anytime

Capturing network traffic is usually done either for security reasons or to troubleshoot networking issues. But by the time you initiate a network capture (either manually or automatically) it’s often too late already – the train has already left the station. Point in case: Say your SIEM (obviously EventSentry) detects abnormal or suspicious behavior in a log and a network capture is initiated.

Navigating the Future of Exposure Management

Navigating the Future of Exposure Management The future of exposure management involves overcoming integration challenges within organizations. Analysts call for a shift towards platformization and a risk-based approach, emphasizing asset discovery and visibility. No single vendor can fulfill all needs, highlighting the importance of a multi-vendor ecosystem. Various vulnerability scanners, including traditional and cloud types, are essential. Effective remediation requires prioritization, workflow integration, and teamwork to address vulnerabilities and updates.