Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Gartner Lays out Three Use Cases of Network Detection and Response (NDR) Adoption

The Gartner recent report, “Emerging Tech: Top Use Cases for Network Detection and Response”, lays out three primary use case drives, which include: Before we dive deeper into Gartner findings, let’s talk about NDR from a high level.

What is the Cost of SSO Software? SSO Pricing

Single sign-on (SSO) is an important security function for many business enterprises, especially with the rise of more cloud apps and services. Essentially, an SSO allows a user to log into a device only once with a single set of credentials to gain access to a variety of corporate apps, websites, and data.

Capturing Security and Observability Data From Oracle Cloud

A couple of years ago, I wrote another blog on how Oracle Cloud Infrastructure (OCI) Object Storage can be used as a data lake since it has an Amazon S3-compliant API. Since then, I’ve also fielded several requests to capture logs from OCI Services and send them through Cribl Stream for optimization and routing to multiple destinations. There are two primary methods to achieve this.

NIST Incident Response Steps & Template | Blameless

The National Institute of Standards and Technology (NIST) provides the framework to help businesses mitigate cybersecurity risks. The framework also protects networks and data, outlining best practices to inform decisions that save time and money. Creating a cybersecurity strategy that identifies, protects, detects, responds, and helps you recover from cybersecurity incidents is critical in the evolving threat landscape.

Common Vulnerabilities and Exposures: What They Are, and Notable CVEs to Be Aware Of

As organizations and individuals rely more and more on technology for many aspects of their lives, the security of digital assets is of increasing concern. From personal data to critical infrastructure, the digital landscape is rife with potential vulnerabilities that can be exploited by malicious actors. Cybersecurity has become a mainstream imperative as breaches and cyber threats continue to escalate.

How to Comply With the SEC's New Cybersecurity Rule

On July 26, 2023, the Securities and Exchange Commission (SEC) introduced new rules regarding cybersecurity risk management, strategy, governance, and incidents. Public companies subject to reporting requirements must comply with the changes to avoid rescission and other monetary penalties, not to mention the risk of legal action and reputation damage. Here, we look at the two new cybersecurity rules and how your company can comply. ‍

Understanding DDoS Attacks: Motivation and Impact

DDoS attacks disrupt services and damage reputations, with motivations ranging from political to personal. These attacks can also mask more severe security breaches, so early detection and mitigation are crucial. Learn how Kentik provides a solution by analyzing enriched NetFlow data to identify and mitigate DDoS threats.

Preview Confidential AI with Ubuntu Confidential VMs and Nvidia H100 GPUs on Microsoft Azure

With Ubuntu confidential AI on Azure, businesses can undertake various tasks including ML training, inference, confidential multi-party data analytics, and federated learning with confidence. The effectiveness of AI models depends heavily on having access to large amounts of good quality data. While using publicly available datasets has its place, for tasks like medical diagnosis or financial risk assessment, we need access to private data during both training and inference.

Streamlining Lead Generation: Strategies to Boost Efficiency in Digital Marketing

In digital marketing, the art of lead generation is ever-evolving, demanding a departure from conventional approaches to stand out in the crowded online landscape. This guide aims to uncover unconventional strategies that go beyond the usual playbook, injecting ingenuity into lead-generation efforts. Come along as we explore innovative ways to streamline lead generation and boost efficiency in your digital marketing endeavors.

SSL Certificate Errors: A comprehensive guide

SSL certificates create an encrypted connection between a web server and a user’s browser. This encryption ensures that any data transmitted remains private and secure, making it essential for protecting sensitive information like passwords, credit card numbers, and personal details. However, when there’s an issue with the SSL certificate, users can encounter errors that not only disrupt this secure connection but can also hint at potential security risks.