Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

IT Heroes Podcast - EPS 06 SMB's response to a cyberattack

In this episode, Edgar hosts Andy Ellwood, VP of Product Marketing, Pulseway, and Giridhara Raam, Cybersecurity Evangelist, Pulseway to discuss why the cyber response is important for SMBs and how should SMB's react to a cyber incident - communication norms, response protocols, and tips to up their game on the reactive approach.

3 Benefits of Having Managed Cyber Security Services

Businesses are increasingly reliant on technology, and as a result, they are becoming more vulnerable to cyber-attacks. So, If you're not sure your business is protected against cyber threats, it's time to consider managed cyber security services. These can make a tremendous difference in the level of protection for your organization, and they will allow you time to focus on other important aspects. In this blog post, we will discuss the three main benefits of having a managed cyber security service in place for your business.

SOARs vs. No-Code Security Automation: The Case for Both

Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword associated with security modernization. Today, however, SOAR platforms are increasingly assuming a legacy look and feel. Although SOARs still have their place in a modern SecOps strategy, the key to driving SecOps forward today is no-code security automation.

5 Top Tools for Application Security Testing: Features to Look For, Pros and Cons

When it comes to application security testing, choosing the tool best suited for the job is critical. There are so many various tools on the market that determining which one is best for your needs may be difficult. In this article, we will discuss 10 of the best testing tools and outline the features you should look for when making your decision.

What Are the Benefits of Investing in Cloud Storage Security?

As more and more businesses and individuals choose to store their data online, ensuring the safety of information is becoming exceptionally crucial. According to recent statistics from the Hosting Tribunal, over 95% of IT professionals use cloud storage. This number is expected to grow steadily.

How to Mitigate CVE-2022-0847 (The Dirty Pipe Vulnerability)

Dirty Pipe vulnerability is a Linux kernel vulnerability that allows the ability of non-privileged users to overwrite read-only files. The vulnerability is due to an uninitialized “pipe_buffer.flags” variable, which overwrites any file contents in the page cache even if the file is not permitted to be written, immutable, or on a read-only mount, including CD-ROM mounts. The page cache is always writable by the kernel and writing to a pipe never checks any permissions.

Secure your hosts with CFEngine Build modules

Last year, we launched functionality for users to add policy for reporting data, compliance reports, promise types, and other code as modules. With CFEngine Build, users can manage and update their own policy, the default policy and any additional modules separately. This makes it very easy to utilize policy or other modules written by the CFEngine team, or other community members. In this post we will take a look at using some modules to improve the security of our infrastructure.