Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Network Security Monitoring with Suricata, Logz.io and the ELK Stack

Suricata is an open source threat detection system. Initially released by the Open Information Security Foundation (OISF) in 2010, Suricata can act both as an intrusion detection system (IDS), and intrusion prevention system (IPS), or be used for network security monitoring.

PHP Error Log Basics

When developing PHP applications, error logs tend to be underutilized due to their apparent complexity. The reality is that PHP error logs are extremely helpful, especially when configured and used properly. While there are advanced tricks to truly squeeze every last drop of utility out of error logs, this article will cover the basics of configuration and the most common use cases so you can get up and running quickly.

Four Reasons Why Service-Centric AIOps Is A Better Bet Than Your Average AIOps Point Tool

By 2022, Gartner predicts that 40% of large enterprises will adopt AIOps solutions to cope with never-ending alert floods and ensure faster recovery from disruptive IT outages. The AIOps market is experiencing rapid growth with explosive enterprise adoption, accelerated revenue growth and continued investments from IT operations players.

Bring Structure to Your Logs with Custom Parsing on LogDNA

Picture a perfect world where all logs shared the same layout, format, and structure. Every application, programming language, and logging framework created logs that were verbose, yet easily parsable. Of course, we don’t live in this ideal world, and so we’re stuck with dozens or even hundreds of various log formats. While LogDNA supports a large number of common log formats, there are formats out there that our automatic parsing engine won’t recognize.

BugSplat Integrates Auth0 for improved login security

As part of our continuing security program here at BugSplat, we’re switching to an authentication service called Auth0 for all of our account logins. Auth0 is a universal authentication and authorization platform that supports customer-requested features like federated logins, which means authenticating with a different provider, and Multi-Factor Authentication (MFA) which is a two-step login protocol requiring separate verification from a mobile device to access your account.

Five worthy reads: AI and ML: Keys to the next layer of endpoint protection

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about why incorporating AI into your UEM strategy may be inevitable.