Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Observability Data vs Data Observability: What's the Difference?

Fun fact: Observability goes all the way back to the 1960s, coined by scientist Rudolf Kálmán as a way to measure a system through its output. Now, over six decades later, observability has fragmented into several specialized segments — from application observability, to security observability, and everything in between. The two segments driving the most confusion are data observability and observability data.

Forbes Names Cribl as One of America's Best Startup Employers 2023

Values led culture. Meaningful work. Remote-first environment. Massive growth. A love of Goats. These are just some of the ingredients that make Cribl a place where employees can do their best work. And we’re honored to be recognized by Forbes as one of America’s Best Startup Employers 2023 with a top 10 ranking! Not all awards are created equal, and this recognition by Forbes is particularly meaningful because it’s based on extensive data research and social listening analysis.

Why Automation is Critical for Improving an Enterprise Security Posture

Cybersecurity threats are coming in hot and have quickly become an urgent concern for organizations of all sizes. In response, security teams are shifting away from homegrown security solutions and towards automation using commercially available tools. As organizations seek to improve their security resilience, they find themselves also needing to scale their security teams more efficiently as they address continuous staffing shortages.

Unlocking the Value of Your Data with Cribl Search: A Journey with Darmar the Security Analyst

Those of you in the know, have already met Darmar, our Security Analyst at the Cribl University campus. (If you aren’t in the know, check out our newly rolled-out CCOE Stream Admin training to meet our beloved – & fictitious – goat). Hang with me, while I recount Darmar’s journey to unlocking the full value of their data.

Enabling TLS on a Cribl Leader Node: Step-by-Step Guide

Securing your internal systems with TLS can be a daunting task, even for experienced administrators. However, with the right tools and guidance, the process can be made more manageable. In this blog, we’ll show you how to enable TLS for your internal systems on your Cribl Leader Node. We’ll walk you through the steps, and provide a video tutorial embedded below to help you follow along.

Using Cribl Search for Anomaly Detection: Finding Statistical Outliers in Host CPU Busy Percentage

In this blog post, we’ll demonstrate how to use Cribl Search for anomaly detection by finding statistical outliers in host CPU usage. By monitoring the “CPU Busy” metric, we can identify unusual spikes that may indicate malware penetration or high load/limiting conditions on customer-facing hosts. The best part? This simple but powerful analytic is easily adaptable to other metrics, making it a versatile tool for any data-driven organization.

Bracing for Impact: Why a Robust Observability Pipeline is Critical for Security Professionals in 2023

2023 is well underway and now more than ever it’s important to stay ahead of data trends and security concerns that are ever mounting. With the cost of catastrophic cyber attacks estimated to be ten times that of all other disasters combined, businesses need to take proactive measures to implement a security data pipeline to protect their data and comply with security and retention requirements.

AWS Configuration for the Cribl Pack for SentinelOne Cloud Funnel

In the blog titled “Streamline Endpoint Data with Cribl Pack for SentinelOne Cloud Funnel” we dove into the Cloud Funnel data, its relevance in the modern SOC, and how Cribl Stream transforms the data while addressing visibility gaps. We left the AWS-specific details to this blog for those not yet familiar with configuring AWS S3 buckets, SQS Queues, and Identity and Access Management (IAM).

Streamline Endpoint Data with the Cribl Pack for SentinelOne Cloud Funnel

Cribl empowers you to take control of your observability, telemetry, and security data. Wherever your data originates from, wherever your data needs to go, and whatever format your data needs to be in, Cribl gives you the freedom and flexibility to make choices instead of compromises. Addressing visibility gaps by ingesting more data sources as the threat surface continues to expand has been a challenge.

Tackling the Security Budget in Times of Economic Uncertainty: IT and Security Leaders Prioritize Cybersecurity

In today’s economic climate, IT and security budget owners are always looking for ways to increase efficiency while controlling costs. With tighter budgets and increasing workloads, organizations have to find ways of stretching their limited resources while making sure investments are paying off.