Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Top 3 RapidSpike E-commerce Tools: Part 3 - Security

Performance and security are the lifeblood of an e-commerce website. The moment pages start to slow down, or your customers fear their data may be at risk, is the moment your business starts to fail. This post is the third in a series exploring the key tools every ecommerce site needs running 24/7.

RBAC support with Sysdig Secure

We often hear from our customers that to adopt a container and Kubernetes security tool in any mid sized or large organization, separation of duties and least privilege access via RBAC is a must. Admin roles cannot be granted unnecessarily to all teams. If users or groups are routinely granted these elevated privileges, account compromises or mistakes can result in security and compliance violations.

Speed: A Security Analyst's Best Friend

In so many ways, speed is a security analyst’s best friend. From threat detection to containment to response – the faster you are, the more secure your business will be. It’s exactly why metrics like dwell time, MTTD (mean time to detect) and MTTR (mean time to respond) exist. It’s a barometer for the strength of your organization’s security, and a gauge of success for any good security team.

Network Security Monitoring with Suricata and Telegraf

At the end of 2019, we released a new Suricata input plugin with Telegraf 1.13.0. In this blog, I’ll talk about the the powerful combination of these two open source products — the importance of Suricata and why you should use Telegraf to monitor its performance. I wanted to start off first thanking Sascha Steinbiss for submitting this plugin. Here at InfluxData, we can’t tell you how much we value our open source community.

Bringing Data to Home Security With Arlo

How would you like to be in touch with what’s happening at your doorstep at all times — whether it’s a package delivery, or your loved ones arriving home — no matter where you are? Now think about the folks at Arlo, a leading home automation company, who deliver on this promise for 3.4 million homes in over 100 countries. We hear from Suma about how she uses Arlo to get notified as soon as her kids arrive home from school.

How to Secure Office365 with Cloud SIEM

SaaS adoption is continuously on the rise and so is the number of companies migrating their email services to Microsoft Office365. It’s the most popular SaaS service and while over 90% of enterprises use it, only less than a quarter of them have already migrated to the cloud-based suite. Nonetheless, this number is growing steadily, as cloud adoption rates are increasing.

How to Monitor User Permissions on Linux Servers With SolarWinds Server Configuration Monitor

Understanding who has permissions to what and how those permissions levels change over time is an important piece of the puzzle when it comes to protecting sensitive data from getting into the wrong hands. However, this can be a difficult task when dealing with permissions on Linux servers and files. In this video, we'll show you how you can see who has access on your Linux servers, monitor and alert on changes to those permissions, and track the changes over time for auditing purposes.

Guide: Smarter AWS Traffic Mirroring for Stronger Cloud Security

So, you’ve installed Coralogix’s STA and you would like to start analyzing your traffic and getting valuable insights but you’re not sure that you’re mirroring enough traffic or wondering if you might be mirroring too much data and could be getting more for less. The harsh truth is that in order to be able to detect everything, you have to capture everything and in order to be able to investigate security issues thoroughly, you need to capture every network packet.