Operations | Monitoring | ITSM | DevOps | Cloud

The Role of Threat Hunting in Modern Security

Security and IT teams may be loathe to admit it, but security has historically been mostly a reactive affair. Security engineers monitored for threats and responded when they detected one. They may have also taken steps to harden their systems against breaches, but they didn’t proactively fight the threats themselves. That is changing as more and more teams add threat hunting as one pillar of their cybersecurity strategies.

TL;DR InfluxDB Tech Tips - Using and Understanding the InfluxDB Cloud Usage Template

So you’re using InfluxDB Cloud, and you’re writing millions of metrics to your account. Whether you’re building an IoT application on top of InfluxDB or monitoring your production environment with InfluxDB, your time series operations are finally running smoothly. You want to keep it that way. You might be a Free Plan Cloud user or a Usage-Based Plan user, but either way, you need visibility into your instance size to manage resources and costs.

Why companies need URL filtering for enhanced cloud protection

The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with the accelerated adoption of cloud applications in the workplace—has created an urgent need to scrutinize and control the use of these online resources to prevent data theft, exposure, and loss. This blog elaborates on how a robust URL filtering solution can help manage what cloud services your employees use and how they interact with these services.

5 Tips for SaMD Development

Software as a Medical Device (SaMD) is a booming tech segment expected to skyrocket in the near future. Experts expect the global SaMD market to grow from $596.3 million to over $7.36 billion between 2021 and 2027, an astonishing 38.4% compound annual growth rate. Software developers understandably want in on the action-not only to profit, but to provide solutions that save lives and improve the quality of life for millions of healthcare consumers. But even software developers who have worked in regulated industries have not necessarily prepared themselves for the unique challenges of developing SaMD.

Secure Software Development: How to Check Your Code

In May of 2021, a cybercrime organization called DarkSide successfully locked operators of the Colonial Pipeline, which supplies the east coast with 45% of its petroleum fuel, out of their own software system with a type of malware called "ransomware." True to its name, ransomware returns access to your software (in theory) if you pay a ransom. The result-fuel supplies collapsed across the eastern United States, with gas lines, price spikes, and panic. People began hoarding gasoline in states not even served by the Colonial Pipeline. The US government passed emergency legislation. Even DarkSide seemed shocked at the impact of their cyberattack.

Five worthy reads: Internet of Behaviors - Exploring beyond the Internet of Things

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week let’s welcome a new acronym to the club — IoB (Internet of Behaviors) and assess its impact. Organizations are making the best use of analytics, A/B testing, and more amazing things to map the perfect customer journey. Here comes the missing piece to building an ideal user journey: Internet of Behavior (IoB).

Featured Post

How to Hire an Operations Manager

Operations managers are the linchpin between the company's internal and external operations. They oversee what goes on with internal stakeholders and take appropriate actions to ensure everything works perfectly in the outside world, i.e., with customers, investors, shareholders, etc. Hiring for this role can be challenging, especially with the high competition for top-level talent. So we've rounded up some tips to help you out with the hiring process.

Understanding Network Speed And Latency

Businesses are demanding more from their networks than ever before. Be it moving more of your data and applications to the cloud or supporting the needs of an increasingly remote workforce, network performance is becoming more critical for the day-to-day running of a business. In this blog we look at the role that speed, bandwidth and latency can play in overall network performance, while exploring some of the ways IT managers can deliver a more reliable and consistent network experience...