Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Automatic correlation of FireEye red team tool countermeasure detections

Sumo Logic has reviewed the announced breach on December 8, 2020 by FireEye and their subsequent public release of over 300 countermeasure rules. We are continuing to analyze the available information and would like to share this update to all existing and prospective customers interested in how our Sumo Logic services can assist with this development.
Featured Post

12 Hybrid Cloud Security Threats That You Can Fix

When it comes to having a safe and secure multiple-cloud architecture, you'll need a hybrid cloud security mindset, which focuses on securing data wherever it may be. When done correctly, a hybrid cloud (private and public) can help make your company more productive while saving money. However, a secure hybrid cloud requires a well-thought-out plan, and plenty of focus on encryption and data access control. With that said, here are 12 of the most tedious security threats in hybrid cloud security that you can actually fix.

Preventing malicious use of Weave Scope

Intezer and Microsoft reported on Sept. 9 that TeamTNT hackers are deploying Weave Scope in compromised systems as an auxiliary tool in their intrusions. Weave Scope is a legitimate and powerful tool to manage server infrastructure that, once deployed, makes it easy to control all resources. In this article, we will describe how this tool can be used maliciously, and how to add specific checks in your security set up to look for it.

Getting Up and Running with Calico for Windows

Calico is the only cross-platform CNI and networking and network security policy engine available today. It currently powers more than 150,000 known clusters across millions of nodes worldwide. Calico is also unique in supporting multiple dataplanes: Standard Linux, eBPF, and Windows HNS. Many organizations have .NET and Windows workloads that they have or eventually will modernize and deploy to Kubernetes. However, this may be uncharted territory for teams that are using Windows. This session is intended to inform and ease your adoption of Kubernetes on the Windows platform.

See and Secure containers on AWS Fargate

Tune into our #LinkedInLive event on December 9 from 11:30am-12pm PST and join Sysdig and Amazon Web Services (AWS) experts, Pawan Shankar and Eric Carter, to learn how to scan #AWS #Fargate containers in under 4 minutes with Sysdig Secure. Join this live discussion to learn how Sysdig Secure closes the visibility and security gap by providing the first automated #Fargate inline scanning.

New SAML Group Mapping Support

In July, we rolled out SolarWinds® Papertrail™ support for SAML v2.0. SAML authentication allows you to log into your Active Directory® domain or intranet and have immediate access to Papertrail, with no additional login required. Today we’re extending Papertrail SAML 2.0 support to include group mapping. Group mapping allows you to define organization and product roles, and grant access to logs and billings plans, by adding an account to an identify provider group.

Create a New Integration in Opsgenie

Opsgenie is a powerful alert management service that allows you to flexibly set up teams for different alerting groups. Our development team have been working hard to deliver new features and integrations, and now you are able to integrate Opsgenie with RapidSpike to help with your website monitoring.

Elastic on Elastic: How InfoSec deploys infrastructure and stays up-to-date with ECK

This post is part of a blog series highlighting how we embrace the solutions and features of the Elastic Stack to support our business and drive customer success. The Elastic InfoSec Security Engineering team is responsible for deploying and managing InfoSec's infrastructure and tools. At Elastic, speed, scale, and relevance is our DNA and leveraging the power of the Elastic Stack is the heart of InfoSec.