Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How Aumni Keeps Errors out of "Userland"

Different development teams exercise different production philosophies. These philosophies usually stem from greater company direction and culture but are guided by the experience of technical leadership. Aumni has built a unique technology solution to unlock data insights into investment auditing and due diligence for VCs. They need to remain nimble and develop great code (areas 1 and 2) but reduce the probability of user-facing errors and the time spent detecting and fixes new issues (area 3).

Tutorial: Log to Console in PHP

“All code and no logging makes John a black box error-prone system.” Logging is a key aspect of monitoring, troubleshooting and debugging your code. Not only does it make your project’s underlying execution more transparent and intelligible, but also more accessible in its approach. In a company or a community setting, intelligent logging practices can help everyone to be on the same page about the status and the progress of the project.

The Cost of Doing SIEM & Security Analytics on Your Own

Security information and event management, or SIEM, has become part of the vocabulary of every organization. SIEM solutions gather events from multiple systems and analyze them—both in real time and through historical data. SIEM costs—as cyber security costs in general—can be high, but there is a tradeoff if you opt for the FOSS route (free and open source solutions).

Schedule Rotations

Today, we are excited to announce PagerTree now officially supports schedule rotations! A long awaited feature and requested by many customers, with schedule rotations it’s now easier than ever to schedule a list (or “rotation”) of people for full coverage support. Schedule rotations are available on our Pro and Elite pricing plans and are technically a subset of our “recurring schedules” feature.

2020 Trends in Software Development

Coding Sans has published the State of Software Development Report since 2018 in an effort to uncover the rapidly evolving trends of this particularly agile industry. Each year, the report highlights challenges, best practices, and the tools that are driving the software development industry, and how things have changed year over year.

How Fortinet and Tigera Protect Kubernetes in the Enterprise

Container use continues to grow, and Kubernetes is the most widely adopted container orchestration system, managing nearly half of all container deployments.1 Successful integration of container services within the enterprise depends heavily on access to external resources such as databases, cloud services, third-party application programming interfaces (APIs), and other applications. All this egress activity must be controlled for security and compliance reasons.

StackState's Health Forecasting

Forecasting health is vital in today's society. Who has the highest risk of getting a virus? Are you able to predict when this will happen? Knowing answers to these questions could save many lives. Forecasting the health of IT infrastructures is equally essential. Think of identifying databases that are about to stop serving requests in a timely matter, hard drives that are about to run out of space, or Service-level agreements (SLA's) that are about to cross the set thresholds.

Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1)

Last month, we hosted a webinar, Hunting for persistence using Elastic Security, where we examined some techniques that attackers use in the wild to maintain presence in their victim’s environment. In this two-part blog series, we’ll share the details of what was covered during our webinar with the goal of helping security practitioners improve their visibility of these offensive persistence techniques and help to undermine the efficacy of these attacks against their organization.

How to Avoid Alert Overload From EDR Solutions

In today’s chaotic digital sphere, networks are distributed across an increasingly wide range of hackable endpoints. From smartphones and tablets to Internet of Things (IoT) devices—everything gets connected to the network. EDR technologies and practices were created for the purpose of providing active endpoint protection and defense. However, if your systems and admins are overloaded with alerts, an EDR strategy might become obsolete.

What is the ideal retention period for application logs

That is a common question I see among developers. Most of the time, nobody cares about system logs. But when things go south, we absolutely need them. Like water in the desert, sometimes! At Dashbird, we have a list of criteria compiled to determine a reasonable retention policy for application logs. There is no one-size-fits-all, though. The analytical dimensions below will give a relative notion of how long the retention period should be.