Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Featured Post

Black Friday: How Retailers Can Create an Optimal Online Experience

For about a year and a half now, traditional window shopping has been replaced in many places by online shopping sprees. Particularly as the coronavirus pandemic began, general shopping behavior has shifted toward e-commerce. And although most stores have now returned from lockdown to open their store doors, there is no denying the online shopping industry is still thriving. For the second year in a row, the holiday shopping season is also directly affected by this trend.

User-scoped API Keys

Checkly has released a change to the way API keys are created and managed. In the past, API keys were account-scoped. These account-scoped keys have full access rights to your Checkly account and no accountability to which user is using the key. When we originally built Checkly, we made it a tool to enable individual developers to quickly and easily set up browser and API checks. We help ensure your web applications are up and running and send alerts when something goes wrong.

A comprehensive lifecycle approach to ransomware defense

Ransomware continues to be a costly and growing problem. According to Infosecurity Magazine, the number of ransomware attacks grew 288% between the first and second quarters of 2021. Cybersecurity Ventures estimated a ransomware attack occurs every 11 seconds, Cybercrime Magazine reports. The resulting price tag from ransomware is truly staggering.

Understanding business and security risk

Even if an organization has developed a governance team, aligning integration decisions with business needs must be incorporated into the zero trust architecture. The company’s business model drives the applications chosen. The senior leadership team needs someone who can translate technology risks and apply them to business risks. For example, security might be an organization’s differentiator.

Controlled Unclassified Information: Top 4 Management Tips

In 2010, the United States government mandated an order to safeguard sensitive information it created or owned. Unlike classified information which can be accessed by only a few key people, unclassified information can be accessed by many governmental and non-governmental bodies. Therefore, this information can't be termed as classified, but it still requires controlled access and dissemination due to its sensitive nature. Hence the name, Controlled Unclassified Information (CUI).

How Puppet supports desktop and laptop automation in a changing world

The world has changed since I started out on a help desk in Colorado 25 years ago. In those long ago years, a company’s desktop machines actually lived under the desks of many in the organization (and often doubled as a foot warmer!) and configuration was done machine by machine manually, or maybe even by some script that was created to run at login if we were lucky. If there were laptops in use by the business users, they were a lot less mobile and rarer than in today’s business world...

ARTICA becomes official CNA

There are “good” hackers. They call themselves security analysts and some even devote their time to working for the common good. They investigate possible vulnerabilities in public and known applications, and when they find a possible security flaw that could endanger the users of those applications, they report that vulnerability to the software manufacturer. There is no reward, they are not paid for it, they do it to make the world safer.

3 Ways To Prevent Cyber Security Threats When Marketing Online

No matter what type of business you operate, cyberattacks can be destructive to your company. Even though you think your Information Technology (IT) team should be handling any cybersecurity issues, it doesn't have to always go that way. All the departments should take a proactive role in safeguarding the privacy of your business.

Outage or Breach - Confront with Confidence (2021)

A Recent Dice Article Titled – Data Breach Costs: Calculating the Losses referenced a 2021 IBM and Ponemon Institute study that looked at nearly 525 organizations in 17 countries and regions that sustained a breach last year, and found that the average cost of a data breach in 2020 stood at $3.86 million.