Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The New Normal: Organizations Need Security Leaders More Than Ever

The world is changing at a pace not seen in modern history. Security leaders, including chief information security officers (CISOs), face new security challenges as well as opportunities. As COVID-19 drives workers to look for new ways to live and work, organizations must be proactive. The ‘new normal’ may seem scary at first, but savvy CISOs who see beyond tactical changes to the threat landscape can capitalize on opportunities.

Security operations center, Part 1: The guardian of your organization

Hackers arm themselves with the latest technologies, employ different techniques, and try to exploit all possible vulnerabilities in the security of an organization. With these tools under their belt, hackers will persist until they get what they want. To stay one step ahead of hackers and remain up to date on cutting-edge technologies, your organization needs a dedicated team whose main objective is to detect and stop cyberattacks that threaten it.

12 Container image scanning best practices to adopt in production

Don’t miss out on these 12 image scanning best practices, whether you are starting to run containers and Kubernetes in production, or want to embed more security into your current DevOps workflow. One of the main challenges your teams face is how to manage security risk without slowing down application delivery. A way to address this early is by adopting a Secure DevOps workflow.

Up and running with Calico Host Micro-segmentation on AWS

In this online training, we will explain how to install and configure Calico on AWS VMs to apply network policy to resources outside your K8s cluster. The talk will be primarily a walkthrough and demo and you will receive all manifests and instructions to do the demo on your own after the session.

Onelogin Log Insights with Coralogix

OneLogin is one of the top leading Unified Access Management platforms, enabling organizations to manage and Access their cloud applications in a secure way. OneLogin makes it simpler and safer for organizations to access the apps and data they need anytime, everywhere. This post will show you how Coralogix can provide analytics and insights for your OneLogin log data – including performance and security insights.

3 Ways to Maintain Your Agency's Focus on IT Modernization

Congress set the stage for IT modernization across the federal government by passing the Modernizing Government Technology (MGT) Act, allowing agencies to apply for a loan from the Technology Modernization Fund (TMF) to update their legacy systems. The theory states, with access to TMF funds, agencies can now improve innovation, enhance efficiencies, and strengthen their security postures.

InfluxDB Endpoint Security State Template

Our team recently discovered an exposed endpoint without authentication enabled, though we know it had previously been required. The root cause was a missing configuration as a result of a recent upgrade a few weeks earlier, and was easy to fix by simply enabling the configuration parameter correctly. We needed a way to catch this type of issue quickly going forward, for this and for other public endpoints, which should be secure by default. Here is how we solved it.

Detect Content Security Policy (CSP) violations with Raygun

A Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement to the distribution of malware. Whilst blocking attacks is important, it is also useful to be notified of attacks when they happen. A breach could bring your organization to a halt — from broken webpages to data breaches.

Deliver CASB policy alerts via OnPage to ensure rapid response

A simple, efficient way to deliver CASB policy alerts, ensuring that the SOC teams are notified of policy breaches immediately in order to start the incident triage and remediation process using OnPage incident alert management system. About OnPage Organizations large and small, are adopting OnPage's intelligent alerting solution, ensuring that encrypted, secure critical incident notifications are NEVER missed and are always delivered to the right person at the right time.