Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to Strengthen Security on Windows 10 Networks

The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It’s debatable exactly how bad the OS actually is or isn’t in this regard. In this article, we’ll be exploring some methodologies and best practices for hardening the security status of your Windows 10 workstations and network configuration.

Website Security: Web Monitoring Tips for Keeping Your Site Safe

With the constant threat of DDoS, DNS attacks, malware, and data breaches; website security is a top priority for today’s tech teams. You’ve taken the appropriate measures. Your domain uses HTTP/S, SSL encryption, and is locked up tight. Or is it? In 2018, Symantec reported over 70 million records were leaked or stolen because of misconfigured S3 buckets.

To Protect and Secure: Selling Cybersecurity as a Service

Auvik AVP of product management Patrick Albert talks with Tayler Feigl, Channel Development Manager, APAC at Datto to discuss key findings in Datto’s annual State of the Channel Ransomware Report, the result of interviewing 100,000 small to mid-sized business (SMBs) around the globe. You’ll hear what your MSP peers are doing to prepare, protect, and recover against ransomware, and investigate how you can use these findings to sell cybersecurity as part of your managed services offering.

Identify risky cloud behavior in your Amazon AWS Cloudtrail logs with CHAOSSEARCH

Trying to make sense of your AWS Cloudtrail logs? Have you given up hope that you'll ever create an Elasticsearch index mapping to search all that data? Watch as Pete Cheslock dives into some AWS Cloudtrail data to identify risky cloud behavior.

7 non-negotiable security practices for any cloud product

Implementing security best practices for your cloud products might feel like you’re playing a game of chess against a chess grandmaster. You think you need to know the most complex strategies and plan ten moves in advance, but in reality, you’re playing against a 3rd-grade checkers player.

New Tigera Secure Enterprise 2.3 Anomaly Detection Deepens Visibility into Suspicious Kubernetes Activities

Tigera is excited to announce several new capabilities with Tigera Secure Enterprise Edition 2.3, extending the ability to uncover sophisticated Kubernetes attacks. Tigera Anomaly Detection capabilities provide insight into unusual behaviors that compromise the security and performance of Kubernetes environments.

Cybersecurity and Interoperability are Dominant Themes at HIMSS 2019

Another HIMSS show is in the books and the impact this year was tremendous, especially in terms of discussions and announcements. Presentation topics varied from artificial intelligence to supply chain management to telemedicine and beyond, but interoperability and cybersecurity were either main themes or cropped up in discussions throughout the event.

Help us understand and measure your SOC performance [Survey]

What gets measured gets managed. You probably intuitively sense the truth in that statement, but are you practicing it? Specifically, are you measuring your security operations center’s (SOC) performance? Measuring the IT security team’s performance has always been subjective. With more and more security techniques emerging in the last decade, your organization may have come up with different metrics to measure the performance of its SOC.