Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

CIS Microsoft Windows Server 2022 Benchmark v1.0.0

In February 2022, the Center for Internet Security (CIS) released the Microsoft Windows Server 2022 Benchmark v1.0.0, which includes over 50 new features, Group Policy Objects (GPOs), capabilities, and services. The document compares Server 2019 and Server 2022 for their similarities and differences, as well as Windows 11 and Windows 10.

Accelerate FedRAMP Compliance with Teleport's Access Platform

FedRAMP authorization can take years. The process is time-consuming, expensive and risky, requiring extensive human capital and dedicated technical resources from the initial project standup through continuous monitoring and compliance reporting before an Authorization To Operate (ATO) has been achieved. The Teleport Access Platform significantly reduces the time, cost and risk associated with FedRAMP compliance by addressing many of the most difficult FedRAMP control requirements.

CloudCasa June Feature Updates

Welcome to the latest edition of our CloudCasa release notes. As we celebrate the 10th anniversary of Kubernetes, we continue to build on the momentum of our substantial updates focused on Kubernetes backup, migration and replication, we’re excited to introduce another set of robust features and enhancements designed to elevate your data protection and management capabilities.

Reverse engineering eBPF programs

eBPF is one of the most widely used technologies in today’s computing ecosystem, starting from the cloud sector up to routing and tracing in companies like Cloudflare. Many companies are basing and transforming their core products to use eBPF as an alternative to kernel modules because of all the benefits it offers both on the business side and technological side. Since this shift is gaining a lot of momentum I wanted to shed some light on eBPF.

Creating symbolic links - Like shortcuts but better

The create symbolic links user right determines the users ability to create a symbolic link within Windows from the device they’re logged on to. These links point to other files or folders, just like regular shortcuts, but works in a more advanced way. Symbolic links help maintain organization and flexibility while minimizing potential security risks by giving the ability to create a link in one folder that points to a file in a different folder, making it seem like the file exists in both places.

Configuring Maximum Security Log Size

Setting the maximum log size for event logs is crucial for your security policy. Proper configuration helps detect attacks and investigate their sources. Insufficient storage can result in information loss and undetected breaches. This article covers everything you need to know about configuring maximum security log size. Server hardening can be labor-intensive and costly, often causing production issues.