Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

4 Monitoring Alerts to Automate Service Desk Tickets and Reduce Downtime

Whether you’re a small business with fewer than 100 employees or a global enterprise with thousands, having an alert system integrated into the service desk can be invaluable. This type of cross-functional integration can trigger automatic incidents in the service desk based on certain monitoring events, particularly issues that impact a significant portion of employees, including critical applications and network infrastructure.

9 Smart Ways to Keep Customer Data Secure on Your E-Commerce Website

E-commerce has now revolutionized the way that people shop. But one of the biggest challenges a lot of e-commerce owners face today is website security. Although selling online opens doors for many opportunities, keeping your site safe from phishing, hacking, and other cyber attacks can be a nightmare for a lot of online business owners. Also, the risk is even higher because the choice of security provisions is often beyond your reach.

How to Prevent, Detect, and Remove Spyware

Spyware is a type of malware that hides deep inside your computer. Unlike more visible types of malware, spyware lets you go about your tasks while secretly recording information—especially passwords and other sensitive credentials. Since spyware is difficult to notice, both home users and system administrators need to prioritize its prevention and detection. Thankfully, even if you have spyware, it’s easy to get rid of with the right tools.

Tigera Announces Open-Source Calico for Windows and Collaboration with Microsoft

Tigera is pleased to announce that we have open-sourced Calico for Windows and made it immediately available for all to use for free. With the launch of open-source Calico for Windows, the vast ecosystem of Windows users now has unprecedented access to Kubernetes via the industry’s de-facto standard for Kubernetes networking and network security.

Don't Let Cyberattacks Derail Your Digital Transformation Journey

Many organizations across the U.K. are tackling the three main factors behind digital transformation: cloud technology, IoT, and employee mobility. However, one downside to increased digitization is how this opens an organization up to the potential for more cyberattacks, which isn’t too surprising when you consider an expanded digital presence equates to an expanded attack surface.

ELK - Not Just For The Nice Visitors

Most of the applications we see for the ELK stack are from businesses which want to improve their customers' experience. To return relevant search results and to create Kibana dashboards that allow them to analyse data and give the customers what they want. But there are some cases where the customer is always wrong, and where the last thing you want to do is give a site visitor what he wants. Welcome to the world of forensics, compliance and fraud detection.

How to configure HTTPS for an Nginx Docker Container

There are a few ways to effectively configure HTTPs for an Nginx Docker Container. In this guide, we will quickly cover configuration through the use of free certificate authority Let’s Encrypt. For plenty of people, using Let’s Encrypt to configure HTTPS for an Nginx docker container is a good option. A paid version like Comodo’s SSL certificates may make more sense if you want to increase the security of your site and server.

SupportWorld Live Goes Virtual! A Recap and Lessons Learned

Conferences, while a lot of work, are such a fun outlet to connect with other people in the IT community. It’s an opportunity to learn about new technologies, trends, and gain new perspectives around the industry. Some of my favorite memories of past conferences stem from the exhibit hall passport games and morning coffee breaks, mingling with other attendees whose paths you may not typically cross. Those were the days!

Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range

The recent disclosure of CVE-2020-1472 vulnerability by Microsoft showcases the need for tools that allow defenders to quickly replicate published exploit code, register attack data, and create signatures or other mitigations against released exploits with a high likelihood of exploitation against popular infrastructure or operating systems.