Your Security Operations Center (SOC) faces complex challenges for keeping corporate data safe and in the right hands everyday. The right tooling is critical for success.Deciding when—and how—to make investments in SOC tooling is complex and challenging across organizations. There’s a ton of vendor spin out there and it’s important to understand what’s real and what isn’t.These … [Read more...] about Best Practices for SOC Tooling Acquisition
Practices
Centralized Log Management Best Practices and Tools
What is centralized log management? And why bother?Centralized logging is a critical component of observability into modern infrastructure and applications. Without it, it can be difficult to diagnose problems and understand user journeys—leaving engineers blind to production incidents or interrupted customer experiences. Alternatively, when the right engineers can access the … [Read more...] about Centralized Log Management Best Practices and Tools
Best Practices for MongoDB Monitoring with Prometheus
The MongoDB document-oriented database is one of the most popular database tools available today. Developed as an open-source project, MongoDB is highly scalable and can be set up in your environment in just a few simple steps.When running and managing databases, monitoring is a key requirement. In this article, we’ll review monitoring MongoDB using Prometheus, and provide a … [Read more...] about Best Practices for MongoDB Monitoring with Prometheus
Best Practices for Kubernetes Monitoring with Prometheus
Kubernetes has clearly established itself as one of the most influential technologies in the cloud applications and DevOps space. Its powerful flexibility and scalability have inarguably made it the most popular container orchestration platform in modern software development, helping teams manage hundreds of containers efficiently.However, Kubernetes and the applications … [Read more...] about Best Practices for Kubernetes Monitoring with Prometheus
Secure Your Hybrid Workforce Using These SOC Best Practices
Hybrid Workforce is here to stay Just a few years ago when the topic of supporting offsite workers arose, some of the key conversation topics were related to purchase, logistics, deployment, maintenance and similar issues. The discussions back then were more like “special cases” vs. today’s environment where supporting workers offsite (now known as the hybrid workforce) has … [Read more...] about Secure Your Hybrid Workforce Using These SOC Best Practices
Cisco Secure 5 Best Practices Security Analysts Can Use to Secure Their Hybrid Workforce.
The hybrid work environment has been around for years, albeit not common but it existed. I can recall my first job where I was able to split my time working in an office and working from my makeshift home office. This was many moons ago as I will call it… pre-COVID-19. Job seekers are certainly looking to have the flexibility of working from anywhere at any time – preferably … [Read more...] about Cisco Secure 5 Best Practices Security Analysts Can Use to Secure Their Hybrid Workforce.
Best Practices for Navigating the Security Poverty Line
InfoSec, like any other aspect of IT, is a matter of three factors coming together: people, process and technology. All of these factors cost time and money in some way.The truth is, there are very few organizations out there who can supply their own security programs, staff, technology, processes and everything needed for InfoSec to an efficient degree. Everyone has to … [Read more...] about Best Practices for Navigating the Security Poverty Line
Italy’s Antitrust Regulator Fines Google and Apple for “Aggressive” Data Practices
Italy's antitrust regulator has fined both Apple and Google €10 million each for what it calls are "aggressive" data practices and for not providing consumers with clear information on commercial uses of their personal data during the account creation phase. The Autorità Garante della Concorrenza e del Mercato (AGCM) said "Google and Apple did not provide clear and immediate … [Read more...] about Italy’s Antitrust Regulator Fines Google and Apple for “Aggressive” Data Practices
3 Best Practices for Building a High-Performance Graph Database
CrowdStrike® employees like to say that there is big data, huge data and our data. To date, we have collected, analyzed and stored more than 15 petabytes of data, generated through hundreds of billions of daily security events. At the center of this massive data repository is CrowdStrike Threat Graph®, our custom-built, cutting-edge security analytics tool that collects … [Read more...] about 3 Best Practices for Building a High-Performance Graph Database