5 ways agile devops teams can support IT service desks
 
  Devops teams should specifically tailor planning, release, and deployment
  communications or collaborations to their audiences. For service desk and
  customer support teams, communications should focus on how the release impacts
  end-users. Devops teams should also anticipate the impact of changes on
  end-users and educate support teams. When an application’s user experience or
  workflow changes significantly, bringing in support teams early to review,
  understand, and experience the changes themselves can help them update support
  processes. ... Let’s consider two scenarios. One devops team monitors their
  multicloud environments and knows when servers, storage, networks, and
  containers experience issues. They’ve centralized application logs but have
  not configured reports or alerts from them, nor have they set up any
  application monitors. More often then not, when an incident or issue impacts
  end-users, it’s the service desk and support teams who escalate the issue to
  IT ops, SREs (site reliability engineers), or the devops team. That’s not a
  good situation, but neither is the other extreme when IT operational teams
  configure too many systems and application alerts.
Safeguarding Schools Against RDP-Based Ransomware
  Most school districts now acknowledge that things will not be back to normal
  this fall, and they are planning hybrid learning solutions for the school
  year. Hackers are delighted with this development since distance learning is
  often implemented using Microsoft's Remote Desktop Protocol (RDP), one of the
  prime targets for cybercriminals, aiming for quick gains. Their primary
  tactic: install ransomware that locks up data until ransoms are paid.
  Recently, in June 2020, the University of California San Francisco School of
  Medicine paid a ransom of over $1 million to regain access to important
  scientific data. While a K-12 school or school district may not have data
  worth millions, cybercriminals know that schools often lack the resources
  large corporations deploy to guard against cyberattacks, which makes them
  prime targets. One specific attack vector the FBI has warned about is Ryuk
  ransomware, which is deployed via RDP endpoints, specifically students,
  parents, and teachers in the K-12 environment. Ryuk uses a sophisticated type
  of data encryption that targets backup files. Once the end user has been
  infected, that person can propagate the virus to the school's servers, where
  it can cause havoc.
Arm swimming in a sea of uncertainty that could sink its business model
  "The risk with Arm going forward is Arm works because I can source Arm IP, and
  I know that Arm will not compete with me. Some of Arm's other customers might
  compete with me, but my supplier will not compete with me because they do not
  sell chips," he said. "We're moving to a scenario now where there's a
  potential that if I'm sourcing IP from a company that will compete with me for
  product -- the selling of chips -- that's obviously going to cause concern for
  quite a few companies that may also raise antitrust or anti-competitive issues
  in terms of closing the deal as well." And this is before the situation with
  Arm China enters the equation. Arm China is a joint venture -- the style of
  arrangement many western companies enter into to do business in the Middle
  Kingdom -- and in July, Arm sought to fire the CEO of that venture, Allen Wu,
  for running another company that invested in Chinese Arm customers on the
  side. That would normally be a pretty straight forward case of conflict of
  interest, except Wu has Arm China's registration documents and company seal
  and he has not given them up, Bloomberg reported in July. Arm China also
  posted a public letter signed by 176 of its employees imploring Beijing to
  protect it from the UK parent company.
Why You Should Stop Saving Photos From iMessage, WhatsApp And Android Messages
 
  Check Point’s POC attack was that an image would be messaged to a victim over
  a popular platform—iMessage, Android Messages or WhatsApp, and the content of
  the image would tempt the victim to save the photo to their device. It’s
  easily done—most of us do it all the time, even if just to share the image on
  a different platform, rather than forward the message we have received. Check
  Point’s Ekram Ahmed told me that this should serve as a warning. “Think twice
  before you save photos onto your device,” he told me, “as they can be a Trojan
  horse for hackers to invade your phone. We demonstrated this with Instagram,
  but the vulnerability can likely be found in other applications.” That’s
  almost certainly the case—the issue was with the deployment of an open-source
  image parsing capability buried within the Instagram app. And that third-party
  software library is widely installed in countless other apps. ... The issue
  comes when you save that to the album on your internal phone’s storage or an
  external disk. We saw this last year, with WhatsApp and Telegram exposed to an
  Android vulnerability where images were saved to an external disk. That said,
  earlier this year, Google’s Project Zero team warned that the image handling
  by messengers themselves on iOS could be defeated when an unusual file type
  was handled.
Why Data Intensity Matters in Today’s World
 
  Data intensity won’t happen overnight. It’s a journey that brings together the
  right technology, best practices, and infrastructure foundation. The first
  step is to start with proven available technologies. Open Source offerings may
  tempt us with the latest technical bells and whistles, but they aren’t always
  the solution that aligns best with our business objectives. One reason that IT
  projects fail so often is that people choose the wrong technology. As you
  evaluate the tooling you will use with your data, consider whether you need
  some of the scale and complexity that comes with these technologies. Not every
  company is a Facebook or a Google. Choose the technology that lines up best to
  your own use case and your platform, not merely the flavor of the month. Don’t
  be afraid to purchase the technology and tools you need, rather than build it
  yourself. Maximizing data literacy is another key step toward data
  intensity. It starts with establishing a common way to talk about data, using
  a baseline set of knowledge, such as SQL. Understanding the data is more
  important than understanding the technology behind it.  Even the best
  solution won’t do you any good if you can’t bring it into production.
GCA releases new version of the GCA Cybersecurity Toolkit for SMBs
  The GCA toolkit provides small businesses a way to address these risks with
  free tools and resources that they can implement themselves. For government
  and industry, the toolkit is a valuable resource that can be provided to help
  secure their supply chain and vendors. “Helping small businesses address
  cybersecurity challenges requires that we meet them where they are, with
  resources designed to match their resources and expertise. We worked with
  partners and stakeholders to develop the GCA Cybersecurity Toolkit for Small
  Business more than a year ago and since that time have evolved the toolkit to
  be even easier to use, either all at once or a step at a time,” said Philip
  Reitinger, GCA’s President and CEO. “This revision of the toolkit is a
  significant step forward on this front, and we are pleased to share it to
  further assist small businesses reduce cyber risk.” Since its initial launch
  there have been more than 105,000 visits to the toolkit. Key to the success of
  the toolkit has been partnerships with organizations such as Mastercard,
  ICTswitzerland, and the Swiss Academy of Engineering Sciences (SATW), the
  latter two of which resulted in the German translation of the toolkit and
  makes an important contribution to the implementation of the National strategy
  for Switzerland’s protection against cyber risks (NCS).
7 low-code platforms developers should know
 
  Low-code platforms are far more open and extensible today, and most have APIs
  and other ways to extend and integrate with the platform. They provide
  different capabilities around the software development lifecycle from planning
  applications through deployment and monitoring, and many also interface with
  automated testing and devops platforms. Low-code platforms have different
  hosting options, including proprietary managed clouds, public cloud hosting
  options, and data center deployments. Some low-code platforms are code
  generators, while others generate models. Some are more SaaS-like and do not
  expose their configurations. Low-code platforms also serve different
  development paradigms. Some target developers and enable rapid development,
  integration, and automation. Others target both software development
  professionals and citizen developers with tools to collaborate and rapidly
  develop applications.  I selected the seven platforms profiled here
  because many have been delivering low-code solutions for over a decade,
  growing their customer bases, adding capabilities, and offering expanded
  integration, hosting, and extensibility options. Many are featured in
  Forrester, Gartner, and other analyst reports on low-code platforms for
  developers and citizen development.
9 Tips to Prepare for the Future of Cloud & Network Security
 
  Discussions of cloud security are often complicated because different people
  have different ideas of what constitutes cloud computing and what their
  personal roles and interests are, Riley said. It's incumbent on organizations
  to focus their attention on aspects of cloud security they can control:
  identity permissions, data configuration, and sometimes application code. Most
  cloud security issues that organizations face fall under these three areas.
  "The volume of cloud usage is increasing, the sophistication is increasing,
  the complexity is increasing, [and] the challenge is learning how to better
  utilize the public cloud," Riley said. A growing dependence on the cloud will
  also force businesses to rethink the way they approach network security, said
  Lawrence Orans, research vice president at Gartner, in a session on the
  subject. The future of network security is in the cloud, and security teams
  must keep up. The changes related to cloud adoption extend to the security
  operations center, which analysts anticipate will take a different form as
  more businesses depend on the cloud, adopt cloud security tools, and support
  fully remote teams. These shifts will demand a change in thinking for security
  operations teams.
How Centralized Log Management Can Save Your Company
 
  Dropping all logs into a SIEM spikes costs, so oftentimes only a portion is
  collected, which creates fragmented or incomplete pictures and impacts
  security monitoring and incident response. CLMs lift the burden of having to
  hire staff, provide training and support for SIEMs. CLMs also reduce the costs
  organizations would incur with their SIEM providers, as well as the risk of
  endangering the SIEM infrastructure by storing unmanaged logs. Fragmented data
  collection can become a unified data collection with a data highway.
  Organizations can now filter unruly data and deliver only what you need. This
  helps overcome the age-old strategy of letting separate teams have their own
  sources of data, which could instead be directed to the appropriate team via
  your data highway. The data highway lets you collect once and use it many
  times, where it’s needed. ... One example of superfluous information is the
  timed mark that many applications add into the log of their system to show
  they are online. Unless a security auditor will need to see this, there is no
  reason why an organization should be paying to store it in their SIEM.
  Administrators are even able to filter out all extraneous text and add parsing
  for specific events.
Applying Chaos Engineering in Healthcare: Getting Started with Sensitive Workloads
  With critical systems, it can be a good idea to first run experiments in your
  dev/test type environments to minimize both actual and perceived risk. As you
  learn new things from these early experiments, you can explain to stakeholders
  that production is a larger and more complex environment which would further
  benefit from this practice. Equally, before introducing something like this in
  production, you want to be confident that you can have a safe approach that
  allows for you to be surprised with newer findings without introducing that
  additional risk. As a next step, consider running chaos experiments in a new
  production environment before it is handling live traffic by generating
  synthetic workloads. You get the benefit of starting to test some of the
  boundaries of the system in its production configuration, and it is easy for
  other stakeholders to understand how this will be applied and that it will not
  introduce added risks to customers, since live traffic isn’t being handled
  yet. To start introducing more realistic workloads than you can get from
  synthetic traffic, a next step may be to leverage your existing production
  traffic.
Quote for the day:
"Challenges in life always seek leaders and leaders seek challenges." -- Wayde Goodall
 
 
No comments:
Post a Comment