Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Discovering Zero Days: Why configuration management wins

“Zero Days” may be one of the most recognizable cybersecurity terms, other than hacker of course, for good reason. Zero Day Vulnerabilities are notoriously challenging for defending security teams to identify. Because of delays between active exploit and discovery, they are one of the worst examples of “Known Unknowns” in cybersecurity (Other than user’s behavior of course..). It’s important to understand that Zero Days are not really brand-new vulnerabilities.

Using Cisco Meraki Solution for SD WAN? ScienceLogic Was Built for That.

Since its acquisition by Cisco in 2012, Meraki has taken off as one of the most valuable tools for simplifying networking in the cloud era. Organizations using Meraki to install and configure software-defined networking (SDN) and software-defined wide area networking (SD-WAN) devices across their IT estates can attest to the fact.