On the 20th February 2019, Alert Logic research teams began tracking vulnerabilities affecting users of Jenkins which could allow an attacker to run malicious software remotely. That same day new detection content was deployed to monitor for abuse and over the following hours teams in research and security operations began managing exploit attempts in the wild and raising incidents to customers. Continue reading Emerging Threat Jenkins Plugins Remote Code Execution
Earlier this year, Embotics and Ponemon Institute released a study on the cost and impact of falling behind on the DevOps movement. This study surveyed over 600 IT leaders responsible for cloud management at their organization. It explores the gap between expectations of value from the public cloud, DevOps, containers, and microservice and what their organizations can do today. Continue reading Managed DevOps: Expectation vs. Reality
Every modern browser like Google Chrome, Mozilla Firefox, Apple Opera, and Microsoft Edge comes with a built-in password manager tool that allows the user to save their login information for automatic form filling. These browser-based password managers are designed to automatically detect login forms for the user on a webpage and automatically fill-in the saved credentials accordingly. Continue reading Is Managing your Password with Web Browser Safe?
Cloud computing occupies a unique spot in IT history. In its early beginnings, it was the latest in a series of new models for IT operations. Existing systems were migrated to cloud providers and companies found benefits in its cost and flexibility, while working through issues around security and integration. Today, the cloud offers a path for business transformation. Cloud computing trends among technology decision-makers include usage and plans across various cloud services and deployment models, investments, businesses, drivers, and impact on business strategies and plans. Continue reading State of Enterprise Cloud Computing 2018