Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

New in Grafana 10: A UI to easily configure SAML authentication

In addition to the built-in user authentication that utilizes usernames and passwords, Grafana also provides support for various mechanisms to authenticate users, so you can securely integrate your instance with external identity providers. We are excited to announce that with the release of Grafana 10.0, we have introduced a new user interface that simplifies the configuration of SAML authentication for your Grafana instances.

Choosing the Right CMS for Your Business: Factors to Consider

Are you ready to elevate your online presence and take your business to the next level? Choosing the right Content Management System (CMS) is the key to building a successful website that not only attracts visitors but also converts them into loyal customers. With countless options available in the digital landscape, it can be overwhelming to find the perfect CMS that aligns with your business goals. Fear not, as we've got you covered! In this blog post, we'll delve into the crucial factors you need to consider when selecting a CMS, empowering you to make an informed decision that fuels your business's growth. Let's get started!

Norway's Government Agencies Breached by Zero-Day Attack (CVE-2023-35078)

In a recent cyber attack that sent shockwaves through the security community, a group of hackers exploited a zero-day vulnerability, CVE-2023-35078, in Ivanti's Mobile Endpoint Management software (EPMM), compromising several Norwegian government agencies. The breach, which targeted twelve government ministries, has raised concerns about the potential risks faced by thousands of other organizations that might be vulnerable to similar attacks. Keep reading to understand the extent of the exploit.
Sponsored Post

The Role Of Software Asset Management In Cybersecurity Preparedness

In this article, we explore the critical role Software Asset Management plays in cybersecurity preparedness. As the threat landscape continues to evolve and malicious actors become more adept at exploiting vulnerabilities, it is essential to take a proactive approach to protect your business and its valuable assets. Our experts delve into the benefits of implementing software asset management strategies, the risks associated with neglecting it, and what you can do to optimize your cybersecurity preparedness.

We used GPT-4 during a hackathon-here's what we learned

We recently ran our first hackathon in quite some time. Over two days, our team collaborated in groups on various topics. By the end of it, we had 12 demos to share with the rest of the team. These ranged from improvements in debugging HTTP request responses to the delightful “automatic swag sharer.” Within our groups, a number of us tried integrating with OpenAI’s GPT to see what smarts we could bring to our product.

Top 4 Methods Used to Attack Networks (And How to Defend)

Threat actors use a number of different techniques to gain access to company networks so that they can deliver ransomware payloads. In this blog, we look at four of the most common techniques currently being used to attack networks. The intent is to help MSPs and IT admins understand where the threats are coming from, and then where to focus their attention in order to protect their (or their customers’) networks.

What Does A Business Need To Make It Safer?

As an employer, regardless of your company's size or the nature of your business, you have a responsibility to provide a safe workplace for your employees. Keeping your buildings in good repair and installing adequate flooring and lighting are just two examples of what you can do to make your workplace safer. You should also provide safety training to your employees both when they first start working for you and on a regular basis thereafter. Here, we'll cover the safety groundwork that must be laid before you can call yourself a company owner.