Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Cloud SIEM: Getting More Out of Your Threat Intelligence - 3 Use Cases for IOCs

Ever since JASK was founded, we have heavily integrated with threat intelligence platforms to gain context into attacker activity through indicators of compromise (IOCs). Now that we have joined Sumo Logic, our customers have the ability to pull in more data than ever making this feature even more powerful. One of our tightest integrations is with the Anomali (formerly ThreatStream) platform.

Reputation Matters - Nexthink's Execs Share Favorite Customer Stories

Perhaps one of Nexthink’s most endearing qualities is that it has never been a “drink the kool-aid” type of company. Yes, we are proud to be the leading experience management platform in IT, but that honor is most championed from outside, not within. From its beginnings, Nexthink has been used by enterprise IT to narrow the gap between what employees expect at work and what they receive.

Logging for DevSecOps

Logging is probably not the first item to come to mind when most of us think about DevSecOps, a term that refers to the integration of security into DevOps processes, but it should be. Logging and log management play a critical role in helping to put DevSecOps principles into practice by ensuring that developers, IT operations staff, and security teams have the visibility and communication pipelines they need to prioritize security at all stages of the DevOps delivery cycle.

Event Chaos or Enrichment? BigPanda's CTOs Can Help You Decide

In our recent “IT Ops Demystified – Event Chaos or Enrichment?” webinar our field CTOs discuss how enrichment can help reduce operational costs by an order of magnitude. Here is a quick overview of all the goodness that you’ll be watching.

Robotics Recap: Learning, Programming & Snapping ROS 2

Robotics@Canonical puts a strong focus on the migration from ROS to ROS 2. ROS 2 benefits from many improvements, especially robot security. Our goal is to make it easy for you to transition to ROS 2, whether you’re completely new to ROS or a seasoned engineer retooling for a new environment. Your new platform should be secure-by-default, and we expect you’ll need to pivot between different environments as you migrate from ROS to ROS 2.

How Artificial Intelligence is Shaping the Industry of VPN

Artificial intelligence refers to the machine's ability to learn and think. Given that it sort of mimics how humans think and reason, AI's application is virtually endless. AI reduces human error, do a task that is risky for humans to do, help humans solve complex, and so much more. With the emergence of artificial intelligence, concerns about data privacy have been brought into the light. Artificial intelligence relies on our personal information to learn.

What is a Status Page? (& How Does It Benefit Companies/Customers)

There’s nothing worse than turning on your computer to start the work day and discovering the internet is down. We all know the frustration of tediously trying to figure out what’s wrong before finally breaking down and calling our service provider and waiting on hold, only to discover that it’s a known issue and it’s being addressed. What if there was a better way?