Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How Password Managers Help Meet Cybersecurity Requirements

The first Thursday in May is World Password Day. This is a good opportunity to look at your cybersecurity practices and privileged access strategies. As cyberattacks increase, more organizations are choosing to get some peace of mind by acquiring cyber insurance to mitigate liability and losses in case of an attack. However, getting cyber insurance may not be an easy exercise.

Introducing the Grafana Labs Bug Bounty Program

At Grafana Labs, we value the open source community and recognize the power of crowdsourcing. This is why we have decided to launch our very own bug bounty program, managed in-house by our own team, to encourage ethical hackers from around the world to help us find and responsibly report security vulnerabilities in Grafana Labs software.

Monitoring Kubernetes clusters activity with Azure Managed Grafana and Calico

Cloud computing revolutionized how a business can establish its digital presence. Nowadays, by leveraging cloud features such as scalability, elasticity, and convenience, businesses can deploy, grow, or test an environment in every corner of the world without worrying about building the required infrastructure.

This Month in Datadog: DASH 2023, In-App WAF and User Protection, Cloudcraft for Azure, and more!

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on DASH 2023..

Strengthen Your Security Strategy to Safeguard Against Migrations Risks

In part 1 of this post, we talked about how Cribl is empowering security functions by giving our customers freedom of choice and control over their data. This post focuses on their experiences and the benefits they are getting from our suite of products. In a past life, I was in charge of security and operational logging at Transunion — around 2015, things started going crazy.

POS Security: How to Protect Your Android POS Systems

The adoption of POS devices across industries is advancing, fast! Businesses including restaurants, grocers, and retail stores are seeing POS devices as a multi-functional hub that offers menu creation, tableside ordering, employee management, CRM, inventory management, and more. According to statistics, 59% of retailers made focusing on omnichannel capabilities their top POS priority in 2020.

Big data security foundations in five steps

We’ve all read the headlines about spectacular data breaches and other security incidents, and the impact that they have had on the victim organisations. From LastPass to SolarWinds, “data security” seems to be the phrase on the lips of every CTO these days. And in some ways there’s no place more vulnerable to attack than a big data environment like a data lake.

RCA Series: Accelerate security investigations w/ machine learning and Elastic (3/4)

Comprehensive security requires multiple layers of threat protection. Sophisticated threats exploit idiosyncrasies in your environment. Unsupervised machine learning identifies patterns of normal activity from your data, and therefore can catch attacks that standard approaches to threat hunting, such as pre-defined rules, are likely to miss. This video explains how machine learning adds a layer to your threat protection, and how interactive tools offered in the Elastic Security solution accelerate the investigation of security incidents.