Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Innovator Preview: 2024 Q4 Additions and Enhancements to Ivanti's Security Portfolio

Ivanti Neurons focuses on patch management with recent updates emphasizing continuous remediation and risk-based strategies. New maintenance tracks allow for routine and targeted vulnerability management. The October release enhances deployment options and introduces patch reporting features, including compliance reporting and dynamic configurations for Linux. The Q4 release aims to provide actionable evidence on exposures, linking to potential hacker targets. The session wraps up with thanks and an invitation for future discussions.

10 Tech Hacks That Help Make Life Easier

As it is visible, everyone's life can be easy with the advancement in technology. The portable devices can have cool hardware and clever software. The work environment is made easier with the help of technology, whether it means taking out the repetition from previous work, improving the use of devices such as a smartphone, or changing the structure of a person's place. Here are 10 tech hacks that will not demand much effort or time.

Entra ID Security Monitoring

The whitepaper delves into how effective monitoring of identity access and authentication can enhance security, improve compliance, and mitigate potential threats. By examining key metrics, best practices, and real-time monitoring strategies, this whitepaper demonstrates how Microsoft Entra ID monitoring can proactively safeguard IT infrastructures, detect suspicious activity, and streamline access management for hybrid environments.
Sponsored Post

How to Detect Threats to AI Systems with MITRE ATLAS Framework

Cyber threats against AI systems are on the rise, and today's AI developers need a robust approach to securing AI applications that address the unique vulnerabilities and attack patterns associated with AI systems and ML models deployed in production environments. In this blog, we're taking a closer look at two specific tools that AI developers can use to help detect cyber threats against AI systems.

Subdomain takeover: ignore this vulnerability at your peril

The Domain Name System (DNS) is often described as the address book of the Internet. A and AAAA records map a human-friendly hostname like honeybadger.io to some machine-friendly IP address like 104.198.14.52. Other types of DNS records also exist; in particular, CNAME records are records that map a hostname to some other hostname, thereby delegating IP resolution to the latter.

Effortless Data Compliance with Cribl Lake

Organizations generate, collect, and store vast amounts of telemetry data. With this data comes the growing responsibility to ensure compliance with various regulations, from GDPR to HIPPA. Data compliance ensures data is handled, stored, and processed according to laws and standards protecting personal information. But what makes compliance regulations scary is that it’s ever-changing and rules vary across industries, making it complex to manage.

Feature Friday #32: Doing math in policy with eval()

Ever need to do some math during policy evaluation? Sometimes configuration settings are based on available resources. For example, what if you want to calculate the size of shared buffers to be 25% of your available memory? Let’s write some policy. First, we need to figure out how much memory we have. Let’s parse this out from /proc/meminfo: So, we have 65505464 kB of memory in total. Knowing that we can use eval() to calculate what 25% is. eval() can also be used to test truthfulness.

Creating a Secure Cyber Environment | Ubuntu Security Podcast

Software supply chain knowledge is crucial for cybersecurity. It's essential to understand not only what's running but also its provenance and reliability. In episode two of our 3-part Month podcast series, Eduardo Barretto and Luci Stanescu join Alex Murray to discuss some of the best cybersecurity practices for everyone.