Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Five Ways To Accurately Measure Employee Experience Success

Even though it’s early, my discussions these first few months of the year tell me that “employee experience” is becoming one of the buzzwords of 2019. The CEOs and CTOs I’ve spoken with at companies of all types and sizes are talking about the need to provide a world-class workplace experience for their employees (and what that actually means).

How Does Google Handle Critical Incidents?

While there are some very good sources out there on how to manage a critical incident, Google also wrote a chapter on incident management in their book, “Site Reliability Engineering”. In this chapter, the folks at Google present their approach to a well-designed critical incident management process.

How to Monitor Activity in Your IBM Cloud with LogDNA

Cloud environments are becoming increasingly complex, with applications and even infrastructures changing constantly. Despite their dynamic nature, these environments must be monitored constantly for teams to ensure the stability, security, and performance of workloads running in them. Tracking these infrastructure changes is one of the most important—and one of the most difficult—parts of maintaining a cloud environment.

Securing a Web Application with AWS Application Load Balancer

I was recently called upon to secure an Nginx web server with HTTPS, and my goal was to set this up with a certificate obtained from AWS Certificate Manager. It took me a while to figure out how to get everything configured and working. Hopefully someone else who is attempting to do the same thing will read this and I can save you some time!

10 Ways to Protect Your eCommerce Site From Hacking and Fraud

According to the Hacked Website Report by Sucuri, the number of websites getting compromised by hackers is increasing every year. The damage related to cybercrime is expected to hit $6 trillion by the end of 2020. If you are planning to launch an eCommerce website or already running a successful one, you must have to upgrade the security of your website regularly. Here, I am sharing some useful ways to keep your eCommerce site safe from hackers and fraudsters.

Monitor IBM DB2 with Datadog

IBM DB2 is a database management system that runs on a wide range of technologies, including Linux, UNIX, Windows, mainframes, and IBM Power Systems. You can use DB2 as a managed service in the cloud or deploy it in a cluster to provide high availability, making it suitable for a wide range of enterprise and customer-facing applications.

How to Defend Your Business Against SQL Injections

One of the oldest (but often neglected) security vulnerabilities is SQL injection. One common scenario goes like this: An unsuspecting programmer writes an application that accepts input from the user which serves as a parameter to retrieve or store data from a database (e.g., a web login form). The programmer writes a dynamically populated SQL query inside the app, based on user input like username and password (see Image 1 for reference).

Magecart - A Victim's Perspective

We’ve discussed Magecart very frequently in recent months and it’s getting worse, with new attacks coming to light on a weekly basis. At RapidSpike, we are committed to raising exposure on these types of attacks and educating companies as to how they can effectively detect data breaches and reduce their exposure to them.

YC leads $50M Series B in Mattermost as open source Slack alternative

Today, we’re delighted to announce that Y Combinator Continuity is leading a $50M Series B investment in Mattermost as an open source alternative to Slack and Microsoft Teams. With today’s announcement, Mattermost becomes YC’s largest ever Series B investment, and more importantly, their largest open source investment to date. YC is joined by our existing investors, Redpoint and S28 Capital, and new investor Battery Ventures.