In this four-part series, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at unforeseen security attack scenarios, and discover how user and entity behavior analytics (UEBA) can be leveraged to safeguard organizations. In this second post of the series, we’ll examine cyberattacks that threaten the financial sector.
Earlier this year, our partner GripMatix released a feature-packed Citrix management pack (MP) that helps improve the monitoring of Citrix environments using SCOM. This was warmly received by our customers who preferred not to shell out for the premium ‘Citrix Platinum’ license, and so don’t have access to SCOM MPs directly from Citrix.
Competition is a funny thing. To gain or keep an edge against your competitors, you may need to push the envelope to use newer technologies and processes. But done wrong, that very technology or process could lead to your ruin. This is where we are with DevOps. The methodology that became popular in the mid-to-late 2000s is embraced by many companies . Done the right way, it will help your organization challenge its competition to keep up with customer and user demands.
Over the last decade, DevOps has become an important part of software engineering culture, influenced by the wide adoption of microservices, containers and cloud computing. A recent step in the evolution of cloud-based and microservice architecture is the serverless computing – a code execution model where the cloud provider takes total responsibility for the operating system and hardware management.
Over the past few years, cloud computing has passed through its hype and early-adopter phases. Now we are hitting the peak of migration from on-premise to cloud-based infrastructure. Consequently, this transition and the advent of cloud computing has dramatically changed the way we think about security. Namely, the security paradigm has shifted towards a Zero Trust Security Model.