First quarter 2018 results
We have started strong! We’ve crossed the finish line for the first quarter, and our revenue gains beat out first quarter 2017 by 26%!
We have started strong! We’ve crossed the finish line for the first quarter, and our revenue gains beat out first quarter 2017 by 26%!
The rather broad definition of personal data in the GDPR requires paying special attention to log data. GDPR and personal data in web server logs is a popular topic in many GDPR fora. For example, IP addresses or cookies might be considered personal data. Consequently, such data must be stored only with the consent of customers for a limited time. It is highly recommended to anonymize personal data before you hand over the logs to any 3rd party to minimize risk.
You’ve always been able to get observability for your Ruby apps by instrumenting them with our SDK, affectionately known as libhoney. Unfortunately, instrumenting code you’ve already written is nobody’s favourite job. If only there were some way to automate the repetitive parts, so you could get instant insight into what your app is doing in production, and then focus your effort on augmenting that insight with the information that’s unique to your app!
In my last post, I gave a high-level overview how to select a threat intelligence vendor and how to integrate indicators of compromise (IOCs) into your SIEM or log management environment. In this post, I will describe in detail how to use the Threat Intelligence plugin that ships with Graylog. I’ll start with the steps necessary to prepare your data, then explain how to activate the feature and how to configure it for use.
Just as news hits of two highly critical security vulnerabilities in Drupal – a popular open source CMS that powers 4.2% of known CMS websites – we have expanded our external Vulnerability Scanner yet again with Drupal specific security checks. We now offer peace of mind for anyone with a WordPress, Joomla!, SilverStripe or Drupal site, as well as checks for thousands of known software and configuration vulnerabilities for all major software products and operating systems.
The Django ORM makes it easy to fetch data, but there's a downside: it's easy to write inefficient queries as the number of records in your database grows. One area where the ease of writing queries can bite is you is with N+1 queries. Expensive N+1 queries go undiscovered in small development databases. Finding expensive N+1 queries is an area where Scout is particularly helpful.
Log files are vital to your organization. From helping organizations troubleshoot IT issues, to investigating security incidents, to locating an application error or isolating an underperforming component, the information that you need to make your life easier is on your logs.
We want to make it easier on you – XpoLog 7 automates your entire log management lifecycle! By doing this we solve log management’s biggest challenges: 1. Long & complex deployments. 2. Long time to resolution. As part of this effort, we are happy to release the Windows Event Log Analytics App (one of many to come).
Docker is a platform for packaging, deploying, and running applications. Docker applications run in containers that can be used on any system: a developer’s laptop, systems on premises, or in the cloud. Containerization is a technology that’s been around for a long time, but it’s seen new life with Docker. It packages applications as images that contain everything needed to run them: code, runtime environment, libraries, and configuration.
Now, you can watch repositories to get an email update with the latest commits or pull request updates. We’ve even added a fresh new look and a little something extra, just for fun. Read on to learn more, or get started with Bitbucket Server 5.10 now.