Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Happy National Cybersecurity Awareness Month!

October is the month of spooky scares, so it makes sense that National Cybersecurity Awareness Month is also recognized at this time—after all, what’s more scary than, for example, having someone phish for your personal information and using said info to ruin your credit or losing your password to hackers so they have access to your bank account?

Web browser security. Is it really safe?

If there is still a reason why you have a post-it covering the webcam of your laptop, if you have not yet had the audacity to delve into the deep web despite all the mysteries they say it contains, if you only enter the Internet in incognito mode, sitting in your armchair with a blindfold: then you’re worried about one thing: safety. Today, in our blog, we will discuss Web browser security. Which are the safest? Is there life beyond Google Chrome?

The Sapphire Ventures CIO Innovation Index Report: CIOs Forge Tighter Bonds with Startups, Especially in AI

Despite a rocky year in the global economy, global venture deal volume grew by over 9.3 percent in the third quarter of 2019, up nearly 9.9 percent from Q3 2018, according to Crunchbase. The year 2018 was a banner year for dollar volume: startups raised $130.9 billion, which surpassed the epic year of 2000, according to Pitchbook.

The Importance of Engineer Walkabouts

A core tenet of managed services is the ability of an MSP to support multiple clients, in various locations, all without ever leaving your desk. While this approach is more efficient and profitable than dispatching engineers out to client sites to deal with every support ticket that comes in, there’s a catch. The challenge is when you become good at doing managed services in this way, you don’t have much of an excuse to visit your client sites at all.

How Informatica Confidently Migrates to Kubernetes with Sumo Logic

Informatica is an enterprise cloud data management company, which means they have a full suite of products that focus on data integration and data management. In fact, they are a leader in 5 different magic quadrants including Enterprise Integration Platform as a Service, Data Quality Tools, and Master Data Management Solutions.

View SQL Queries From Your Code With Prefix

Have you heard the saying “you can’t manage what you can’t measure?” The phrase is often attributed to management thinker Peter Drucker, and less often to other authors as well. It can also slightly vary in its wording, depending on the source. At the end of the day, the exact wording of the sayer and who said it first doesn’t matter as much as whether it’s true or not. We’re here to tell you that yes, it’s true for a lot of things in life.

The importance of event correlation techniques in SIEM

Event correlation tools are a fundamental instrument in your toolbox to detect threats from all sources across your organization in real time. A wise use of the right event correlation techniques through log management and analysis is the cornerstone of any reliable security information and event management (SIEM) strategy – a strategy that focuses on prevention rather than reaction.

How do you really know if your EHR running on Citrix is ready for the workday?

Healthcare environments must ensure application availability around the clock to serve the needs of their patients. In many hospitals, while they serve patients 24×7, there is typically a lighter overnight load, but by the time the sun rises, healthcare teams start staffing in full force. Oftentimes applications in healthcare are deployed via Citrix. The Citrix infrastructure can be complex and adding an EHR application such as EPIC can make early morning health checks take a long time.

Requirements of a Security Platform in a DevOps World

Businesses today cannot afford to be hacked. Cyber attacks can result in hefty fines and lawsuits, not to mention the reputational damage that can result in long-term revenue loss. Of course, this has always been true. But what has changed over the past few years is both the sheer volume of attacks and the growing sophistication used in them. As a result, there is a need an updated and upgraded kind of SIEM security platform to face them.