Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Evidence-Based Threat Detection With Corelight and Cribl

Organizations today face a growing list of obstacles as they try to improve their detection, coverage, and accuracy. For one, data proliferation is happening at an astronomical rate. When was the last time your network bandwidth went down? What about your license costs for data storage or your SIEM? Difficulties arise from overlapping and poorly integrated tools that generate disparate data streams and several operational efficiencies.

Innovations in Pet Microchipping: How Leading Companies Are Enhancing Pet Security

Imagine you're a detective, and your only case is to find a lost family member every time they wander off. Sounds exhausting, right? Welcome to the world of pet ownership. Recent statistics show that 1 in 10 pets will get lost during their lifetime. But don't despair. Thanks to innovations in pet microchipping, leading companies are making great strides in enhancing pet security and even health monitoring. Want to know how this tiny piece of technology could change the way you look after your furry friend? Stick around and we'll uncover the marvels of modern pet care.

Cloud Native Security vs. Third-Party Tools: How to Choose (and Why You Might Not Have To)

Your cloud platform probably came with tools to secure and manage the resources you create. We call those cloud-native security tools because they’re proprietary to the vendor you’re using them on. Third-party alternatives, on the other hand, are usually created to be compatible with several cloud provider platforms at once.

Modernizing financial services: A deep dive into Elastic Cloud on AWS for Observability, Security, and more

In the dynamic landscape of financial services, data is not just currency; it's the key to innovation and operational excellence. Data is constantly streamlining from devices, logins, transfers, transactions, and much more, and it’s bound to increase with an ongoing reliance on digital channels. This creates a massive opportunity and responsibility for financial institutions, as their customers (and regulators) demand more from banking providers.

Two-Factor Authentication Enforcement Now Available On All AppSignal Plans

We recently announced AppSignal Business Add-Ons, our alternative to pricy enterprise plans. The add-ons offered HIPAA BAA, Long-Term Log Storage, and Two-Factor Authentication Enforcement for an additional fee. However, after listening to feedback from our customers, we decided that Two-Factor Authentication Enforcement is a core feature that should be available to all organizations on all plans for free.

Microsoft Defender Endpoint Logs and Cribl Stream - Quick Start Guide

Microsoft Defender offers everyone comprehensive threat prevention, detection, and response capabilities—from individuals looking to protect their families to the world’s largest enterprises. Microsoft Defender allows IT and Security teams to prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Have you ever wondered if you can use Cribl Stream to help manage your Microsoft Defender for Endpoint logs? The answer is Yes (plus benefits)!

Patching Go's leaky HTTP clients

In November 2023 we discovered an issue in the Go standard library’s net/http.Client that allowed an attacker who controls redirect targets on a server to exfiltrate authentication secrets. Soon after, we discovered a similar issue in net/http/cookiejar.Jar. The issues, collectively designated CVE-2023-45289, have now been fixed in Go 1.22.1 and Go 1.21.8, released on March 5, 2024. This blog post dives into the technical details behind those two bugs and the patch that addresses them.

How to track Infrastructure as Code changes in Terraform with Kosli

Infrastructure as Code (IaC) has emerged as a cornerstone for efficiently managing and provisioning infrastructure. Among the many tools available, Terraform has gained unparalleled popularity, offering a declarative approach to defining and deploying infrastructure. But as organizations increasingly embrace IaC to achieve scalability, consistency, and agility, a critical challenge emerges: how to ensure compliance and authorization for infrastructure changes.