Tracing: Why Logs Aren’t Enough to Debug Your Microservices

How SAML 2.0 Authentication Works and Why It Matters
At its core, Security Assertion Markup Language (SAML) 2.0 is a means to
exchange authorization and authentication information between services. SAML
is frequently used to implement internal corporate single sign-on (SSO)
solutions where the user logs into a service that acts as the single source of
identity which then grants access to a subset of other internal services. ...
Generally, SAML authentication solves three important problems: SAML offers a
significant improvement to user experience. Users only have to remember their
credentials with a single identity provider and not having to worry about
usernames and passwords for every application they use; SAML allows
application developers to outsource identity management and authentication
implementation to external providers without implementing it themselves;
and And perhaps most importantly, SAML dramatically reduces the
operational overhead of managing access within an organization. If an employee
leaves or transfers to another team, their access will be automatically
revoked or downgraded across all applications connected to the identity
provider.
Signing up for a data science program is half the battle won. But only a
strong, steady commitment and effort will take it to completion and yield
amazing results. You as an organization may be clear on the ‘why’ of the whole
endeavor. You know that more self-sufficiency and expertise will bring in more
revenue. But without communicating the benefits learning data science has for
your employees, you are unlikely to see genuine involvement. You can encourage
buy-in from employees by showcasing the future career path, rewards of
upskilling, higher payouts for working on advanced projects, or even the fear
of being left out( I hate to say this but this is how the cookie crumbles). Of
course, the seniority in your organization needs to weigh the pros & cons
of such a transformation and accordingly roll out the mandate to selected
groups as there may be employees who may not be sold to the idea of building
the skills required for data science at all. ... A great deal of time, energy,
and effort is saved by a wide variety of platforms that provide a bunch of
tools and services for data science monitoring. They track and test the
employee's progress during the data science program. This can keep your
employees on their toes.
The adoption of cloud services, third parties, and remote access has dissolved
the traditional network perimeter and made security a far more complex
equation than before. Identity security is quickly emerging become the primary
line of defence for most organisations, because it allows security teams to
tailor each user’s access proportionately based on the needs of their job
role. Underpinning this model is Zero-Trust – the practice of treating all
accounts with the same minimal level of access until authenticated. In cloud
environments, for example, any human or machine identity can be configured
with thousands of permissions to access cloud workloads containing critical
information. User, group, and role identities are typically assigned
permissions depending on their job functions. Providing each identity with its
own unique permissions allows users to access what they need, when they need
it, without putting company assets at risk of breach. In combination with
Zero-Trust, it ensures each identity is only able to gain that access once it
is authenticated. The increasing recognition of Zero-Trust as security best
practice has led its stock to rise significantly, so much so that 88% of those
we researched categorised it as either ‘important’ or ‘very important’ in
tackling today’s advanced threats.
The PCI Council made several clarifications to controls within the standard,
added additional guidance to a couple of sections, and added its new module
specific to Terminal Software Requirements, which applies to software intended
for deployment and execution on payment terminals. Specific to the new module
of the Secure Software Standard, Module B, Terminal Software Requirements
focus on software intended for deployment and execution on payment terminals
or PCI-approved PIN Transaction Security (PTS) point-of-interaction (POI)
devices. In total, the new section adds 50 controls covering five control
objectives. ... Similar to Terminal Software Attack Mitigation, Terminal
Software Security Testing clearly calls out the need to ensure software is
"rigorously" tested for vulnerabilities prior to each release. The software
developer is expected to have a documented process that is followed to test
software for vulnerabilities prior to every update or release. The control
tests in this objective continue to highlight secure software development best
practices – testing for unnecessary ports or protocols, identifying unsecure
transmissions of account data, identification of default credentials,
hard-coded authentication credentials, test accounts or data, and/or
ineffective software security controls.
Several of the 29 vulnerabilities are rated as high-severity – including four
local privilege escalation vulnerabilities in firmware for Intel’s CPU
products; another local privilege escalation vulnerability in Intel
Virtualization Technology for Directed I/O (VT-d); a network-exploitable
privilege escalation vulnerability in the Intel Security Library; another
locally exploitable privilege escalation in the NUC family of computers; yet
more in its Driver and Support Assistant (DSA) software and RealSense ID
platform; and a denial-of-service (DoS) vulnerability in selected Thunderbolt
controllers. ... “Interestingly, it’s in the firmware that controls the CPUs,
not in the host operating system,” he continued. “We’re used to automatically
applying updates for operating systems and software products – and even then
we still occasionally see updates that result in the dreaded blue screen of
death.” Applying firmware updates is not as well-managed as software updates,
he noted, likely because they’re tougher to test … which means they pack more
inherent risk.
If you are looking to take your IT career in a new direction where there's
loads of demand, there are several interesting subspecialities, and the pay
continues to increase, a career in cybersecurity can't be beat right now. It's
impossible to ignore all the high-profile attacks -- from the SolarWinds
supply chain attack impacting multiple government agencies, to the more recent
spate ransomware attacks against gas pipeline company Colonial Pipeline and
meat producer JBS, to name a few. The move to work from home and to accelerate
digital transformations has only increased the alert level and the demand for
cybersecurity pros. "In cybersecurity right now there's a significant shortage
of candidates," said Ariel Weintrab, chief information security officer at
Mass Mutual. Her cybersecurity team is hiring from general IT pros and also
"recruiting from a wide variety of educational backgrounds," not just
technology. Her organization is looking for problem solvers with intellectual
creativity. But if you just show up at the hiring office with your liberal
arts degree or your cybersecurity certification, how do you stand out from the
crowd of other applicants interested in cybersecurity?
Quote for the day:
"The test we must set for ourselves is not to march alone but to march in such a way that others will wish to join us." -- Hubert Humphrey
How to build Data Science capabilities within an organization

New identities are creating opportunities for attackers across the enterprise

What to Know About Updates to the PCI Secure Software Standard

Reawakening Agile with OKRs?
The approach I found works best is to lead with OKRs - what the team want to do. So throw your backlog away and adopt a just-in-time requirements approach. Stop seeing "more work than we have money and time to do" as a sign of failure and see it is a sign of success. Every time you need to plan work return to your OKRs and ask: What can we do now, in the time we have, to move closer to our OKRs? Stop worrying about burning-down the backlog and put purpose first, remember why the team exists, ask Right here, right now, how can we add value? Used in a traditional MBO-style one might expect top managers to set OKRs which then cascade down the company with each team being given their own small part to undertake. That would require a Gosplan style planning department and would rob teams of autonomy and real decision making power. (Gosplan was the agency responsible for creating 5-year plans in the USSR, and everyone knows how that story ended.) Instead, leaders should lead. Leaders should stick to big things. They should emphasise the purpose and mission of the organization, they should set large goals for the whole organization but those goals should not be specific for teams.Intel Plugs 29 Holes in CPUs, Bluetooth, Security

How to Deploy Emotional Intelligence for Work Success
“In simplest terms, empathy is putting yourself in someone else’s shoes,” writes Denna Ritchie in a Calendar article. Possessing this is arguably the most important leadership skill. After all, being empathetic is the foundation when building and fortifying social connections. What’s more, it can create a more loyal, engaged, and productive team. As if that weren’t enough, empathy increases happiness, teaches presence and fosters innovation collaboration. ... Speaking of vulnerability, psychologist Nick Wignall defines it as “the willingness to acknowledge your emotions -- especially painful ones.” He clarifies “that when we talk about vulnerability, we’re usually referring to emotional vulnerability. When your best friend suggests that you should work on being more vulnerable in your relationship, they’re probably not talking about making yourself more physically vulnerable.” In short, vulnerability is all about emotions. In particular, difficult emotions like anxiety, frustration, and shame. The other part of the equation is acknowledging these negative emotions and knowing how to address them.Becoming a Self-Taught Cybersecurity Pro

The 6 steps to implementing zero trust
When looking for short term wins in pursuit of a long-term goal, businesses should look to target a single or a collection of applications that would most benefit from adopting a zero trust security model – critical applications that key decision makers are more aware of, which will help demonstrate the return on investment (ROI) along the way. Companies also need to understand that this is a learning process, and thus need to be comfortable in adapting their approach as they learn more about what they are trying to protect. Adopting zero trust means businesses will be re-positioning the usual access models, and this may require solicitation and education of stakeholders. Part of the process however is understanding these dependencies and catering for them in the program. ... The overall aim for businesses is to make quick and measurable progression, so choosing to address a number of areas would be counterproductive. Just like how a business would take a very focused approach when identifying what applications to protect at this stage, they should apply a similar attitude when determining how to approach zero trust itself.Quote for the day:
"The test we must set for ourselves is not to march alone but to march in such a way that others will wish to join us." -- Hubert Humphrey
No comments:
Post a Comment