Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Announcing Logz.io Security Analytics

We founded Logz.io four years ago with a vision to provide a platform for engineers like us to operate the next generation of applications and infrastructure. As engineers, we experienced firsthand the challenges of running large-scale, open-source tools and the frustration of dealing with slow, proprietary tools which were not designed to support the rapidly changing technology stack we operated.

Splunk Everywhere! State and Local Government

State and local governments are looking to embrace new technological innovations so they can deliver on-demand citizen services, extend cyber security and gain real-time situational awareness. Splunk allows these organizations to bridge the operational visibility gap created by siloed machine data, giving users a platform to aggregate and correlate their data for end to end visibility across all of their systems.

Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)

In the past few days, a new vulnerability was disclosed in a widely used component – jQuery File Upload plugin. A change in Apache’s Web Server security setting handling, exposed users of this plugin to an unrestricted file upload flaw. Let’s dig in on how to detect jQuery File Upload vulnerability (CVE-2018-9206) using Falco.

Accelerate Security and PCI Compliance Visibility with New Sumo Logic Apps for Palo Alto Networks

It’s becoming increasingly harder to manage the volume of threats coming into enterprise networks as attackers become more sophisticated, the threat landscape expands and enterprises continue to adopt modern applications at cloud scale.

Using Audit Logs for Security and Compliance

Most software and systems generate audit logs. They are a means to examine what activities have occurred on the system and are typically used for diagnostic performance and error correction. System Administrators, network engineers, developers, and help desk personnel all use this data to aid them in their jobs and maintain system stability. Audit logs have also taken on new importance for cybersecurity and are often the basis of forensic analysis, security analysis, and criminal prosecution.

Splunk Enterprise Security: Event Sequencing

Focus on high fidelity threats to your environment with Event Sequencing in Splunk Enterprise Security and accelerate time to investigate and respond to incidents. To learn more on how an analytics-driven SIEM can address your security challenges, visit the Splunk Enterprise Security product page or read our SIEM Buyer’s Guide.

DevSecOps: Agile Security in the Face of Rapid Change

Security is top of mind for every organization. But with the rapid pace of change that comes with digital transformation, how do organizations keep their products and solutions secure when they are constantly evolving? Learn how a leading organization is using PagerDuty to improve cybersecurity incident response while building security into its products through DevSecOps practices.