Operations | Monitoring | ITSM | DevOps | Cloud

How to

Bits of Security, PedidosYa: Fraud Detection using Datadog and Sherlock

From day one, most organizations,especially the big ones, are targeted with a broad range of attacks. These range from information exfiltration attempts to fraud. Although a great majority of them can be addressed with the help of a Web Application Firewall, there are some that require more extensive tooling. Join me as I show you how we use Sherlock and Datadog to block 30,000+ fraudulent users per week in seconds. We will also discuss other applications and how you can implement similar solutions.

How to Take Data Stored in InfluxDB Cloud 2 and Use It in a "Switch" Node within Node-Red

This video shows you how to take data that is stored in InfluxDB Cloud 2 and use it in a "Switch" node within Node-Red. In our example, we read the average house temperature and decide whether or not the heating should be switched on.