Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Strengthening cyber resilience with data sovereignty

Cyber threats are increasing in severity and frequency, and organizations across a wide range of industries and sizes must stay prepared for outages and other incidents. To protect against these risks, smart enterprises are increasingly embracing cyber resilience, which goes above and beyond cybersecurity practices and helps teams better anticipate, react to, and recover from cybersecurity incidents. This, in turn, ensures the long-term health and success of the business.

Zero-Trust mTLS Automation with HAProxy and SPIFFE/SPIRE

Whether you’re running a service mesh composed of HAProxy instances or facilitating communication between multiple systems, ensuring the authentication of traffic between your services is critical. This zero-trust security model operates under the assumption that you should not extend trust without verification, even within your own systems. By verifying every interaction, you mitigate the risks that arise when third parties imitate your systems.

observIQ Expands Advanced Support for Sumo Logic in Security and Observability Data

We’re excited to announce that as part of our expanded alliance with Sumo Logic, observIQ extended its support for Sumo’s platform. This allows customers to send logs and metrics to Sumo Logic, leveraging our telemetry pipeline, BindPlane. We’ve also made it possible to automatically recommend processors in our pipeline that format data specifically as Sumo Logic expects—once Sumo Logic is a destination for BindPlane.

Moving Past Annual Audits: Why Continuous Cybersecurity is Essential

It’s 2 am on a Saturday, you’re sound asleep, and suddenly your phone lights up, ringing and buzzing loudly on your nightstand. You know it won’t be good news, but it’s worse than you could have imagined—your network and systems have suffered a ransomware attack. As you quickly change and start driving into the office, you keep asking yourself one question—didn’t we pass our annual security audit three months ago with flying colors?

Building an asset attribution system for software security

Asset attribution is an operational necessity for robust digital protection, but hasn't always been easy to achieve. Especially when software state and ownership is unknown, or inconsistent. This blog delves into the historical complexities and challenges of asset attribution for security and engineering teams and explores how Internal Developer Portals like Cortex can help.

5 Best SOC 2 Compliance Solutions in 2024

SOC 2 compliance is crucial for any company handling sensitive customer data, but the process can be a headache. From managing your infrastructure to rigorous audits and ongoing monitoring, staying compliant demands a lot of time and effort. Thankfully, SOC 2 automation tools can make this process much smoother and faster. In this article, I’ll walk you through five top SOC 2 automation tools that can help you get and stay compliant with less stress.

The Role of Machine Learning in Cybersecurity

Machine learning (ML) in cybersecurity dates back to the early 2000s and has become a key tool today in fighting cyber threats. According to Cybersecurity Ventures, global spending on cybersecurity products and services is expected to exceed $1.75 trillion cumulatively from 2021 to 2025, highlighting the increasing reliance on advanced technologies to combat cyber threats.

Feature Friday #22: Don't fix, just warn

Did you know that CFEngine can simply warn about something not being in the desired state? Traditionally with CFEngine, you define your desired state and CFEngine works towards making that happen. Sometimes you might not want CFEngine to take action and instead warn that a given promise wants to change something. Let’s take a look at a contrived example.