#security-monitoring

[ follow ]
#compliance
InfoQ
1 month ago
Privacy professionals

Delivering Software Securely: Techniques for Building a Resilient and Secure Code Pipeline

Project teams should prioritize securing CI/CD pipelines to protect sensitive information including encrypting data at rest and restricting access.
Build and deployment logs should be monitored regularly to ensure no security vulnerabilities are present. [ more ]
New Relic
1 year ago
DevOps

Authentication log monitoring

Authentication logs are records of user authentication events, including successful and unsuccessful login attempts.
Authentication logs serve purposes like security monitoring, forensic analysis, compliance, and troubleshooting. [ more ]
InfoQ
1 month ago
Privacy professionals

Delivering Software Securely: Techniques for Building a Resilient and Secure Code Pipeline

Project teams should prioritize securing CI/CD pipelines to protect sensitive information including encrypting data at rest and restricting access.
Build and deployment logs should be monitored regularly to ensure no security vulnerabilities are present. [ more ]
New Relic
1 year ago
DevOps

Authentication log monitoring

Authentication logs are records of user authentication events, including successful and unsuccessful login attempts.
Authentication logs serve purposes like security monitoring, forensic analysis, compliance, and troubleshooting. [ more ]
morecompliance
[ Load more ]