Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Build a resilient cybersecurity framework by transforming your IT team into a security team

More organizations than ever before have shifted to a hybrid work culture to reduce the impact of COVID-19. This unprecedented change has not only given rise to new security challenges, but has also considerably increased the surface area available for an attack. A blend of personal and corporate endpoints in use, geographical spread of resources, and a sharp spike in the overall number of security threats have further complicated the already labor-intensive security landscape.

Five worthy reads: Every month should be Cybersecurity Awareness Month!

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Organizations on a global scale observe Cybersecurity Awareness Month to educate and instruct their employees on cybersecurity best practices. This week we highlight some cybersecurity trends that are shaping the industry today.

Why the difference between hosted & contained relationships matters with ServiceNow

Are you designing or working with structured configuration management data? No matter the technology platform, you will have come across relationships between various objects. These relationships are critical to keep your data points in perspective and build the bigger picture. One question that often comes up, when working with relationships is: What is the difference between Hosting and Containment relationships?

How to estimate your AWS costs

Amazon Web Services (AWS) is pretty much ubiquitous these days, with everyone from tiny startups to large enterprises using the cloud service to run their apps, websites, and processes. For small businesses, being able to predict your budgets is paramount. Unfortunately, AWS costs can be very difficult to forecast. In this blog, we’ll go over the pros and cons of the tools available to help you estimate your AWS costs.

How to monitor Windows systems with Netdata

Whether you’re a site reliability engineer (SRE), DevOps engineer, or any other role that plays a part in maintaining uptime for your company’s infrastructure, it’s critical to have visibility into all of your systems, regardless of their operating system. This includes monitoring Windows systems, which is a popular use case for Netdata’s community. Here’s the caveat: Netdata has no native Windows monitoring agent.

NOC Operator dashboard and the Root Cause perspective How they help you get actionable insights in SCOM

SquaredUp for SCOM sits on top of your existing SCOM and makes managing it a whole lot easier. In SquaredUp, SCOM data is displayed in beautiful and easily readable dashboards, which are also interactive. The coolest part is that the dashboards can be drilled into, down to the unit level, providing you clear actionable insights. As we will show in this blog with just a few clicks, you can identify the exact source of an alert, isolate the problem and take the appropriate action quickly.

Frequently Asked Questions About Application Performance

Digital transformation is changing the way companies do business, putting pressure on IT to continually monitor and manage the performance of applications delivering business-critical services. IT managers are responsible for making sure applications in today’s increasingly complex IT environment are running as fast and efficiently as possible. Poorly performing applications must be optimized for companies to leverage the benefits of digital transformation.

What life after COVID-19 has in store for us in the world of technology

This 2020 we are living a time of change. In fact, it would not be that crazy to guess that this pandemic will be a turning point, especially due to the obvious fact that such a pandemic has unfortunately turned out to be something with connotations on a global and historical scale.

Detecting Google Cloud Platform OAuth Token Abuse Using Splunk

In a recent post by the Splunk Threat Research team, we addressed permanent and temporary token/credential abuse in AWS and how to mitigate credential exposure. With 94% of Enterprises using a cloud service, and some using at least five different cloud platforms, it’s imperative to stay ahead of threats across multicloud environments. Let’s now turn our attention to Google Cloud Platform (GCP) and how to detect and mitigate OAuth Token Abuse.

Top 5 Python Memory Profilers

According to the Stackoverflow survey of 2019, Python programming language garnered 73.1% approval among developers. It ranks second to Rust and continues to dominate in Data Science and Machine Learning(ML). Python is a developers’ favorite. It is a high-level language known for its robustness and its core philosophy―simplicity over complexity. However, Python application’s performance is another story. Just like any other application, it has its share of performance issues.