<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: agileseo-israel</title>
    <description>The latest articles on DEV Community by agileseo-israel (@agileseoi).</description>
    <link>https://dev.to/agileseoi</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F149391%2F707e5b67-4f82-41c4-96df-ebe35a3fc86b.jpg</url>
      <title>DEV Community: agileseo-israel</title>
      <link>https://dev.to/agileseoi</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/agileseoi"/>
    <language>en</language>
    <item>
      <title>Open Source Security Risks to Know in 2019</title>
      <dc:creator>agileseo-israel</dc:creator>
      <pubDate>Wed, 15 May 2019 18:57:15 +0000</pubDate>
      <link>https://dev.to/agileseoi/open-source-security-risks-to-know-in-2019-lgo</link>
      <guid>https://dev.to/agileseoi/open-source-security-risks-to-know-in-2019-lgo</guid>
      <description>&lt;p&gt;It is widely agreed upon that information technology operations need to turn an even more watchful eye to open source in 2019. Thanks to the growing popularity of open-source platforms such as Kubernetes and Docker, more than 3.5 million applications have now been put into containers using Docker. According to Docker, 37 billion containerized applications have already been downloaded. &lt;/p&gt;

&lt;p&gt;This goes to show that open source will move under a brighter spotlight. Not surprisingly, open source has not only held on to its spot as being the most popular operating system within Enterprise IT, but even more, growth has been predicted. According to &lt;a href="https://www.redhat.com/en/blog/red-hat-continues-lead-linux-server-market"&gt;Red Hat&lt;/a&gt;, Linux has managed to maintain more than 30% share when it comes to global server operating systems. This puts it just behind Microsoft's Windows Server in terms of adoption. &lt;/p&gt;

&lt;p&gt;Additionally, Linux is the lone endpoint operating system that is growing across the globe. This was revealed as part of an IDC InfoBrief sponsored by IGEL in August 2018. According to an industry report, the popularity of IoT-based devices is predicted to expand the use of Linux as a large number of virtual appliances are based on Linux. One of the reasons quoted was that distribution endpoints for Linux-based devices could be modified to provide direct updates with patches undergoing endpoint developer testing for stability. This has boosted confidence in security and optimization in terms of performance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Some Common Open Source Vulnerabilities of 2018&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Glibc&lt;/strong&gt;&lt;br&gt;
February of 2018 saw the critical flaw in the GNU C library exposed. The powerlessness of open source security spread to all Linux-based servers as well as web structures such as Python, PHP, Rails and other API web administrations that make use of the GNU C library. &lt;/p&gt;

&lt;p&gt;The flaw allowed programmers to access applications using a ‘man-in-the-center' assault. This increased the probability of hackers being able to take over a client's framework.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Quadrooter&lt;/strong&gt;&lt;br&gt;
Quadrooter was another open source weakness that turned Android-based phones vulnerable and allowed anyone to expose them to an application containing malware. The hacker was able to access the root of the device by misusing any of the vulnerabilities. &lt;/p&gt;

&lt;p&gt;This put every framework substance and controls like mouthpiece, counting touchy information, GPS as well as framework changes vulnerable to assault.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-Day Linux Kernel Vulnerability&lt;/strong&gt;&lt;br&gt;
The zero-day Linux Kernel vulnerability was another assault that impacted every Linux adaption that 3.8 or higher. It also influenced 66% of all Android-based devices. When the bug was abused, the hacker was able to access the root of the vulnerable user's OS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Critical MySQL Database Vulnerability&lt;/strong&gt;&lt;br&gt;
The critical MySQL database vulnerability affected each version of Oracle's MySQL Database that was accessible. It was also able to clone PerconaDB as well as MariaDB. &lt;/p&gt;

&lt;p&gt;This vulnerability assisted hackers to get unrestricted access to the server through malicious settings injected into MySQL setup documents.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Potential Risks in 2019&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Powered Malware&lt;/strong&gt;&lt;br&gt;
Earlier, attackers kept up communications with vulnerable systems by way of ‘command-and-control' servers (C2). In the situation that malware can use AI to determine ways to mimic normal behavior, hackers would no longer have the use for C2. The malware could potentially also become more robust to detect.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smart Phishing&lt;/strong&gt;&lt;br&gt;
Artificial Intelligence also has the potential to boost phishing attacks where an email or similar message from a seemingly legitimate source is used to entice the receiver to provide sensitive information. A survey conducted by &lt;a href="https://www.cyberark.com/resource/cyberark-global-advanced-threat-landscape-report-2018/"&gt;CyberArk Global&lt;/a&gt;found that 56% of 1,300 information security related decision makers were of the view that targeted phishing attacks were the leading security threat faced by their organization. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerable Critical Systems&lt;/strong&gt;&lt;br&gt;
Critical national infrastructure contains systems whose operations are essential to a nation's security, the country's economy and the safety of its citizens. A fair amount of critical infrastructure is managed by automated industrial control systems. A good example would be in areas of manufacturing and energy. &lt;/p&gt;

&lt;p&gt;According to Kaspersky Lab's State of Industrial &lt;a href="https://go.kaspersky.com/rs/802-IJN-240/images/ICS%20WHITE%20PAPER.pdf"&gt;Cybersecurity Study&lt;/a&gt;,&lt;br&gt;
31% of individuals responsible for the management of these systems faced an information security related threat during the past year.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tips on How to Secure Your Usage of Open Source&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Develop &amp;amp; Implement Policies Around Open Source Usage&lt;/strong&gt;&lt;br&gt;
Some organizations woefully lack even the necessary documentation on open source strategies. Organizations need to have a single responsible person or body entrusted with the management of open source usage. Well documented policies will help developers in their duties when it comes to how best to make use of open source software.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Actively Monitor for Fresh Risks when Using Open Source Software&lt;/strong&gt;&lt;br&gt;
Given that there is an average of more than 3,500 vulnerabilities related to open source uncovered annually, the task of following each vulnerability is never-ending. It does not stop once the applications are out of the development stage. As long as the application is publicly available, organizations need to monitor it for new risks continually. &lt;/p&gt;

&lt;p&gt;To make this happen, you can use the tools available for your repository. For instance, there are tools associated with NPM, Python Package Index, Ruby Gems etc. that help you find issues with your code and your dependencies. Furthermore, there are independent open-source packages like Dependency Check by &lt;a href="https://resources.whitesourcesoftware.com/home/owasp-dependency-check"&gt;OWASP&lt;/a&gt;, OSSIndex, &lt;a href="https://github.com/rubysec/bundler-audit"&gt;Bundler-audit&lt;/a&gt; etc. that identifies vulnerabilities by checking your code against public and private vulnerability databases. &lt;/p&gt;

&lt;p&gt;Additionally, given the increase in the number of security breaches, many organizations are considering security testing as a critical part of a system's development lifecycle. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Maintain an Exhaustive Inventory of Open Source Being Used&lt;/strong&gt;&lt;br&gt;
Organizations should make it mandatory to maintain an inventory of all open source components being used by various teams in the company. A robust open source inventory needs to incorporate –&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Every open source component being used&lt;/li&gt;
&lt;li&gt;The version of each element&lt;/li&gt;
&lt;li&gt;The download areas for every relevant project&lt;/li&gt;
&lt;li&gt;The person responsible for the specific project&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Similarly, the inventory should also include all relevant conditions including the libraries that are being by the code and the potential libraries that the states are connected to. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Be Cognizant of Other Open Source Software Related Concerns&lt;/strong&gt;&lt;br&gt;
The failure to be aware of licenses associated with the usage of open source software can expose organizations to a considerable danger of dispute over intellectual property that might lead to costly financial ramifications. &lt;/p&gt;

&lt;p&gt;Similarly, the use of low-quality or obsolete, outdated open source components can negatively impact the quality as well as the performance of the applications that use them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
The use of open source software within an organization is much more than just downloading and executing a free-to-use program from a website. Different security concerns beg consideration. These need to acknowledged and analyzed before an organization proceeds with adopting any open source software.  &lt;/p&gt;

&lt;p&gt;That said, open source should not be misunderstood as a boundary to security. Instead, when used wisely, it can further strengthen security by adding many individuals as part of a community that can help in uncovering bugs and other vulnerabilities.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Evaluating Cloud Backup Solutions by AWS vs. Azure vs. Google Cloud  </title>
      <dc:creator>agileseo-israel</dc:creator>
      <pubDate>Tue, 26 Mar 2019 03:51:07 +0000</pubDate>
      <link>https://dev.to/agileseoi/evaluating-cloud-backup-solutions-by-aws-vs-azure-vs-google-cloud---2031</link>
      <guid>https://dev.to/agileseoi/evaluating-cloud-backup-solutions-by-aws-vs-azure-vs-google-cloud---2031</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5E-K-0SX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/ozsmbcuxcgadi924nly0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5E-K-0SX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/ozsmbcuxcgadi924nly0.png" alt="alt text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Data loss is an ordeal that many businesses never recover from. In the digital age, all businesses should make the protection of their critical information and files a top priority. Increasingly, businesses are choosing to use the cloud for their disaster recovery.&lt;/p&gt;

&lt;p&gt;In this article, we will explore the characteristics of cloud backup and compare the cloud backup solutions provided by AWS, Azure and Google Cloud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Cloud Backup?&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://searchdatabackup.techtarget.com/definition/cloud-backup"&gt;Cloud backup&lt;/a&gt; is a type of cloud storage where data is stored and then accessed from interconnected and distributed cloud-based systems. Businesses, organizations, and individuals can use cloud-based backup solutions to securely store their data on the internet, using a storage service provider.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Importance of Cloud Backup in a Disaster&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://searchdisasterrecovery.techtarget.com/definition/disaster-recovery"&gt;Disaster recovery&lt;/a&gt; in an ongoing problem for IT platforms. When a power failure takes place or a system crashes data loss may occur. System crashes and other issues caused by natural disasters, human mistakes or malicious activity can result in costly service disturbances. &lt;/p&gt;

&lt;p&gt;Companies need to safeguard their data from loss, so they are protected if and when disaster strikes. Also, Cloud Service Providers (CSPs) need to keep their customer services active even if their data center is affected by a disaster.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using a Cloud-based Backup Solution&lt;/strong&gt;&lt;br&gt;
Cloud-backup services, such as AWS backup, &lt;a href="https://cloud.netapp.com/blog/5-considerations-before-you-backup-on-azure"&gt;Azure backup&lt;/a&gt;, and Google Cloud backup, put the sensitive information of a user in an offsite repository that remains online and is accessible from anywhere. A cloud-based storage solution can be implemented to replace storing data locally on a hard drive or physical disk. &lt;/p&gt;

&lt;p&gt;Cloud backup lets users access services remotely through a protected client login application. Users can backup files from their computer or data center onto the online storage server via an encrypted and protected connection. &lt;/p&gt;

&lt;p&gt;Every business should also have a documented disaster recovery plan and should trial that plan at least twice a year. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3 factors to consider when moving to the cloud&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Have backups on-site and off-site&lt;/li&gt;
&lt;li&gt;Select a cloud with recovery options&lt;/li&gt;
&lt;li&gt;Mirror sensitive data&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;AWS vs. Azure vs. Google Cloud: Storage, Integration, Security and Cloud Configuration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Storage&lt;/em&gt;&lt;br&gt;
Azure calculates storage rates according to your storage requirements, your geographical location, how often you need to retrieve the stored data and the type of data redundancy you select. &lt;/p&gt;

&lt;p&gt;Amazon S3 provides flexibility for scaling storage. With Amazon 3 users are charged for storage used, there are no termination costs or upfront fees. However, unlike Azure, Amazon S3 does not offer multi-regional storage. S3 does use a middle tier class between archival and standard storage. &lt;/p&gt;

&lt;p&gt;Google Cloud provides a combination of the storage class options that Azure and Amazon S3 have. Google cloud tends to be more scalable than the other two. Google offers multi-regional and regional possibilities and a mid-range option. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Integration&lt;/em&gt;&lt;br&gt;
Before the cloud, organization application integration was an intricate process that demanded time and resources. With Cloud based Single Sign On, RestAPI, and connectors, cloud integration has adopted a completely new model. &lt;/p&gt;

&lt;p&gt;When considering cloud platforms, users should assess the functionalities and &lt;a href="https://www.webopedia.com/TERM/A/API.html"&gt;Application Programming Interface (API)&lt;/a&gt; offered by the cloud provider. The volume of APIs that AWS offers is considerable, but Azure offers multiple tools to help developers customize the integration points. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Security&lt;/em&gt;&lt;br&gt;
Today, cloud security is paramount as many companies store sensitive data in the cloud. Most of the leading cloud providers address this issue in their own way. What is important is how organizations put these securities and data backup policies into practice and how they fit in with their organizational requirements.  &lt;/p&gt;

&lt;p&gt;Azure’s model, uses a tiered method. This approach makes sure that organizations can configure security policies for all parts of the Azure cloud stack. Amazon adopts a marginally different approach. Amazon VPC has built-in network firewalls and AWS has web application firewall capabilities. These capabilities make sure that organizations can easily configure private networks. Google cloud platforms provide users with security by making use of features like Security Key Enforcement Cloud Identity and Access Management (IAM) and Cloud Identity-Aware Proxy. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Cloud configuration&lt;/em&gt;&lt;br&gt;
An organization can use the cloud to streamline its infrastructure management, saving time and money. Nearly all cloud providers like AWS, Azure, and Google Cloud, provide a solid infrastructure for cloud transactions and deployment, however, the way they deliver and deploy these services differs. &lt;/p&gt;

&lt;p&gt;Users can configure accounts in motion with AWS. Comparatively, Azure uses large scale deployment of Microsoft Technology stack. Google lacks an edge in this area, because of its late entry and a relatively small presence in the business market. In relation to platform capabilities, Google Cloud lacks functionality, when compared to AWS, in areas such as email, workflow and notification services.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pros and Cons of AWS, Microsoft Azure, and Google Cloud&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;AWS&lt;/em&gt; &lt;br&gt;
Users can upscale the size of AWS with their service and configure it according to their needs. However, AWS tends to overlook the importance of hybrid clouds. AWS has shifted away from on-premises clouds, choosing to manage their cloud services within their data centers. This may limit the amount of control a user can have over their cloud storage environment. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Microsoft Azure&lt;/em&gt;&lt;br&gt;&lt;br&gt;
The connection between Azure and IT applications like Active Directory and Windows Servers has made Microsoft Azure a user-friendly option. Users who wish to store data from one of these programs may opt for Azure backup. However, if users want to use programs other than Active Directory or Windows Server then Azure may not be suitable. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Google Cloud&lt;/em&gt;&lt;br&gt;&lt;br&gt;
Features like the BigQuery analytics engine make this product appealing. Perhaps the top advantage of Google Cloud is its use of machine learning. Google Cloud has one of the largest resources of data: Google Chrome searches. This data will likely pave the way for services that will enhance the profile of Google Cloud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
A disaster can happen at any time, affecting the smooth running of your business and the delivery of your software application to your customers. Disasters include natural disaster, an outage in your network or a bug in your code. Whatever the cause, if your system is down your business can be stopped in its tracks, resulting in lost customers, time and revenue.&lt;/p&gt;

&lt;p&gt;Having a disaster recovery plan in place is a basic requirement. Conventional disaster recovery methods are costly and time-consuming. However, with cloud computing, developing the required backup infrastructure to ensure a speedy and effective recovery is simple and economical.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
