Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Ensure LAPS AdmPwd GPO Extension / CSE is installed

The Windows Local Administrator Password Solution ( Windows LAPS) is a built-in Windows feature designed to seamlessly handle and safeguard the password for a local administrator account on devices joined to either Microsoft Enterprise or Windows Server Active Directory domains. Additionally, Windows LAPS can be utilized to automatically manage and secure the Directory Services Restore Mode (DSRM) account password on Windows Server Active Directory domain controllers.

Top 3 Multi-Cloud Kubernetes Backup Challenges

In the rapidly evolving digital landscape, organizations are increasingly relying on Kubernetes and cloud environments to drive agility, scalability, and innovation. However, this shift has introduced complex challenges in Kubernetes backup and disaster recovery, especially when managing resources across multi-cloud and on-premises environments.

Windows Update Result in Memory Leak and Domain Controllers Crashing

Windows administrators have cautioned that after applying the KB5035855 and KB5035857 updates, released as part of March 2024 Patch Tuesday for Windows Server 2016 and Windows Server 2022, domain controllers running the updated versions of Windows Server may experience crashes and reboots. Affected servers are freezing and rebooting stemming from a memory leak in the Local Security Authority Subsystem Service (LSASS), leading to continually increasing memory usage over time.

Container Security: Creating an Effective Security Program with Reachability Analysis

Containers have taken over the world of software development. According to Gartner analysts, “90% of global organizations will be running containerized applications in production by 2026,” up from 40% in 2021. Containerized applications provide enterprises with an agile, modern approach in the age of cloud computing; safeguarding these technologies from existing and future threats requires equally modern methods.

Kubernetes 1.30: A Security Perspective

Kubernetes 1.30 marks a significant milestone in the evolution of the widely used orchestration platform, particularly regarding security enhancements and developer experience. This post will explore updates encompassing secrets management, node and cluster management, data security and additional security measures. Each of these improvements strengthens the Kubernetes framework, making it a more secure and reliable platform for enterprises and developers.

The Build vs Buy Conundrum: Identity, Access, and Identity Federation Solutions

Managing user identities and access controls is a critical challenge for modern businesses. With remote work, cloud computing, and stringent data privacy regulations, organizations need robust identity and access management (IAM) solutions to ensure secure access to their applications and data. However, when it comes to implementing IAM, companies often face a choice: build a custom solution in-house or buy a third-party product.

What is Infrastructure as Code Security (IaC) - Risk, Challenges & Best Practices

In recent years, Infrastructure as Code (IaC) has emerged as a game-changer for managing IT operations. By enabling teams to define and manage infrastructure using codes, IaC offers numerous benefits, such as increased agility, scalability, and consistency. However, along with the advantages, some unique security challenges also arise that must be addressed promptly. Here in the blog, we’ll explore the best practices to maintain the integrity and reliability of the Infrastructure.

Manage secrets with AWS Secrets Manager with Python - Tech Tip Tuesday

In this video, we show exactly how to use AWS Secrets Manager and how to connect it with your Python application. Secrets are hard to manage and while using methods like storing them as environment variables in a.env file can be suitable, a more secure method particularly in a team is to use a secrets manager so developers can avoid ever needing to handle the plain text secret. Subscribe to the channel to get more Tech Tips on Tuesdays (and also other days)

Mend.io Launches Mend Container

While cloud-native development brilliantly solves problems related to scalability and effective resource use, a more complex architecture and new security challenges come along for the ride as well. The added layer of abstraction of container architecture can make tracking down vulnerabilities and poorly stored secrets, assessing true risk, and enforcing policies difficult for security teams using only traditional AppSec tools.

How LDAP is used in Active Directory

The primary protocol employed within Microsoft’s Active Directory(AD) is Lightweight Directory Access Protocol (LDAP). While LDAP serves as a fundamental component in AD, its application extends beyond, enabling user authentication in various tools and client environments. This includes Red Hat Directory Servers on UNIX systems and OpenLDAP, an open-source application used on Windows platforms.