Operations | Monitoring | ITSM | DevOps | Cloud

Sumo Logic

5 Tips for Preventing Ransomware Attacks

You don't need to be a cybersecurity expert to know that ransomware attacks have become one of today's greatest IT security threats. From WannaCry to the attack against the city of Atlanta, major ransomware exploits have become so commonplace in the last few years that they may seem impossible to avoid. Fortunately, preventing ransomware is far from impossible. Let's take a look at a few strategies you can put in place to mitigate your risk of becoming part of the next ransomware statistic.

Tracking Malicious Activity across the Sumo Attack Lifecycle

In modern network security monitoring, it is not enough to just detect bad things happening. ROI of security operations is always under scrutiny. Security teams, when they exist, and their leadership (CISOs), continually struggle to get budget, at least until a public breach occurs.

Pokemon - Next Generation SOC From Theory to Practice

This session will focus on developing a modern security operations center (SOC) from the ground up leveraging progressive technologies and process. Pokemon will cover the original plan and execution strategy over the past 18 months. They will also highlight Sumo Logic's role in both security architecture and operations and map the map ahead for both Sumo and our SOC.

How to Collect Kubernetes Data

Now that we understand what machine data is available to us, how do we get to this data? The good news is that Kubernetes makes most of this data readily available, you just need the right tool to gather and view it. The solution we will discuss here heavily utilizes open source tools for collection and data enrichment because of their deep integrations and overwhelming community support.

Looker - A single source of truth in multi-source world

Richard Reinders at Looker shows us how you get to Sumo Logic as a single source of truth in a multi cloud environment? How do you ensure consistency? How do you keep your team from having to go into many different systems to get their answers? Finally, how do you get other teams invested in ensuring that what you built is maintained?

We Live in an Intelligence Economy - Illuminate 2019 recap

What a pleasure it was to see many of our customers at our Illuminate user conference, September 11-12. We had record attendance from customers, influencers, and partners. Our time was packed with keynotes, customer presentations (35 customer breakout sessions), certifications, sharing best practices, and time networking and having fun together.

Cloud Scale Correlation and Investigation with Cloud SIEM

Virtually every organization is a victim of cybercrime today. As the threat landscape evolves and proliferates, it’s necessary to prioritize the protection of data, customers’ privacy and brand reputation. Security directors must be prepared and equipped with the necessary tools to detect security events and address them accordingly at all times.