Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Australia's Department of Health Suffers PHI Breach Due to Pagers

In an unprecedented incident that has left medical authorities in Western Australia (WA) in disbelief, a local teenager has been found to be the mastermind behind a massive data breach. The breach intercepted thousands of names, phone numbers and communications between doctors responding to the COVID-19 crisis from their pagers. This is an unfortunate incident and a simple reminder of how pagers jeopardize the security of sensitive patient information.

What Is a Serverless Database? (Overview of Providers, Pros & Cons)

To put it simply, serverless computing is a cloud computing execution model meaning that the cloud provider is dynamically managing the distribution of computer’s resources. What’s taking up valuable computing resources is the function execution. Both AWS and Azure charge more if you have a combination of allocated memory and the function execution elapse time which is rounded up to 100ms.

Cloud Optimization: How to Squeeze More Value From Your Spend

Minimizing costs, reducing risk, and maximizing business value—all at the same time—requires a delicate balancing act. It’s not a new challenge, nor is it unique to IT infrastructures. But when it comes to the cloud, especially in hybrid cloud scenarios, it requires you to understand the performance, risk/compliance, and cost impacts of your current resource allocations and then adjust to maintain the optimal decisions to meet your SLA and budget targets.

Deploying AWS Microservices

There has been increasing buzz in the past decade about the benefits of using a microservice architecture. Let’s explore what microservices are and are not, as well as contrast them with traditional monolithic applications. We’ll discuss the benefits of using a microservices-based architecture and the effort and planning that are required to transition from a monolithic architecture to a microservices architecture.

Mitigating BootHole - 'There's a hole in the boot' - CVE-2020-10713 and related vulnerabilities

Today we released updates for a series of vulnerabilities termed ‘There’s a hole in the boot’ / BootHole in GRUB2 (GRand Unified Bootloader version 2) that could allow an attacker to subvert UEFI Secure Boot. The original vulnerability, CVE-2020-10713, which is a high priority vulnerability was alerted to Canonical in April 2020.

Remote Access Methods: Monitoring Work from Home and File Access

Working remotely has grown over the past several months for many organizations. The ability to provide remote access involves being able to control access to network and cloud-based servers while allowing employees to access the data and files they require to do their jobs. Remote access is also needed to monitor what data and files employees are accessing. Working remotely allows a business to continue to operate when employees are not able to work in the office.

We're evolving our go-to-market functions to build the future with you

ServiceNow isn’t your typical enterprise software company. Our belief that technology exists in service of people and our founding focus on customer success are just a couple of the things that set us apart. When we make your work lives, work better, we all win.

A Unified Security Operations Platform: Splunk Mission Control

Security is easy, right? Get yourself a patchwork of security point products meant to solve one or two specific problems, and your organization is safe from threats! Ah, if only it were that simple… In reality, security operations are disjointed and complex. Security visibility and functionality (i.e. threat detection, investigation, containment and response capabilities) are often divided among a multitude of different security products (e.g.

How Playtech Fixed Metrics Over-Collection with Observability

According to Forbes, 2.5 quintillion bytes of data are created every day. Data volumes have grown exponentially in recent years due to the growth of the Internet of Things (IoT) and sensors. The majority of data collected has been collected in the last two years alone. For example, the U.S. generates over 2.5 million gigabytes of Internet data every minute, and over half of the world’s online traffic comes from mobile devices.

Extend Your Splunk App with Custom REST Endpoints

As you build more complicated Splunk apps, you might wonder, “What is the best way to make the features in my app more usable?” If you’re adding new SPL commands or creating ways to input new data sources, the answer is straightforward. But imagine you’re trying to address one of the following scenarios: For cases like these, consider extending the Splunk REST API with custom endpoints.