Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Integrate Arista CloudVision with Forward Enterprise to Automate Network and Security Verification

Network automation has many benefits for organizations adopting a DevOps model for managing their infrastructure, including speed, agility, and a consistent change control process. However, with improvements in speed, there comes an added risk of configuration errors rapidly propagating through the network. To safeguard against potential mistakes, network and security verification become an essential part of the network DevOps lifecycle.

How do Observability and Security Work Together?

There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro effect of global events propelling ransomware and wiperware development further into the future, rendering enterprise security systems useless. Here at Coralogix, we’re passionate about observability and security and what the former can do for the latter.

The Guide to Kubernetes Compliance

Kubernetes (K8s) has achieved undeniable mainstream status, with 96% of organizations currently evaluating or already using this technology, according to the Cloud Native Computing Foundation (CNCF). This popularity also brings growing scrutiny over Kubernetes compliance standards and audits, in light of how Kubernetes and cloud native technologies demand a very different approach to security.

4 Ways Your Passive Backups Can Drive Active Cyber Defense

Due to the proliferation of cloud-native environments, ransomware attacks have increased dramatically in recent years. Cybercriminals can access a variety of ransomware tools from anywhere in the world at a moment’s notice. This capability has produced an entire economy of Ransomware-as-a-service (RaaS). Despite significant investment in real-time infrastructure security tools, organizations are failing to quickly identify and recover from an attack.

Why CISOs Need to Care about Compliance Regulation in Cybersecurity

Compliance regulation is a necessary evil in the world of cybersecurity. As a CISO, you need to be aware of all compliance regulations that affect your organization so that you can ensure your security program meets these requirements while also protecting sensitive data.

Snyk Live : Legal Side of Open Source Use with Yos Pang

Open source use has spread rapidly throughout the world. With many governments, businesses and consumers utilising open source libraries and platforms on a daily basis. As the adoption of open source has increased there are many legal aspects to consider including licensing, compliance and more. This special episode of Snyk Live we are joined by Snyk Head of APJ Legal, Yos Pang. Yos is an international, commercial technology lawyer, with a strong background in intellectual property and a particular interest in open source and open content issues.

Avoid the 3 Pitfalls of Native Database Auditing for Privileged User Monitoring

Regulations and frameworks such as PCI-DSS, SOX, ​NIST SP 800-53, NERC CIP and HIPAA require privileged user activity to be monitored and audited sufficiently for investigation. Privileged user monitoring and auditing for databases are critical as databases often contain the most sensitive information to an organization. Many organizations leverage built-in database auditing capabilities included with their databases to meet these monitoring and auditing requirements.

End to End Incident Response Using Elastic Security

Join James Spiteri, PMM Director for Elastic Security, as he walks through an entire incident response scenario using several features of the Elastic Search platform including Security features such as SIEM, Endpoint Security, osquery, correlation and case management. Observability features such as logging and APM are also covered as part of this investigative workflow. Additional References.

Security and privacy | Cybersecurity Sessions #9 with Charlie Osborne

Many businesses argue that they need to collect information about customers to verify who they are and secure their accounts. However, this is at odds with online privacy advocates, who say organizations are compromising our security by collecting far too much information about us. In this episode, Netacea co-founder Andy Still talks to @ZDNet cybersecurity journalist Charlie Osborne about the intrinsic link between security and privacy, how legislation like the GDPR has strengthened both, and where responsibility lies for protecting our privacy online.

Kerberos and Active Directory

If you have been researching Active Directory (AD), chances are that you will come across the concept of Kerberos for user authentication and other service request-related functionalities. It is worthwhile to examine the Kerberos protocol in depth and, in turn, appreciate the dependency of AD on Kerberos. Given that Kerberos is an industry standard, you will see that it has become the most widely used network authentication protocol for all Windows environments with operating systems 2000 and later.