Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Identity Governance in Cribl.Cloud

This blog post explores Cribl.Cloud‘s approach to Identity Governance (IG), a crucial strategy for securing access to critical systems and data. Learn how Cribl.Cloud leverages IG to ensure security, compliance, efficiency, and customer trust, while also tackling the challenges of managing custom SaaS APIs within an IG framework.

The State of the Industry With Security Expert Matt Johansen

In this livestream, I talked to security expert Matt Johansen, a computer security veteran who has helped defend everyone from startups to the largest financial companies in the world. We talked about the current state of cybersecurity, why attacks are on the rise, and what can be done to prevent threats in the future. Matt’s blog covers the latest news in cybersecurity and also touches on mental health and personal growth for tech professionals.

Simplifying Data Management in the Cloud: How Cribl and AWS' Strategic Collaboration Agreement Benefits Customers

Without collaborations between organizations, the tech industry wouldn’t be where it is today. Customer expectations and needs don’t exist in a silo. They need their tools to work together to solve problems and deliver value regardless of the vendor. With data growth at a 28% CAGR and cybersecurity threats on the rise, customers need their entire suite of tools working for them in a cohesive manner.

Observability for Everyone

What do you need to achieve observability? Who you ask and the role they hold will influence the answer, but the answer likely follows this pattern: “You only need is how you define observability.” I cannot disagree with this logic. A specific use case may only need a specific type of telemetry. Experience and expertise allow engineers to quickly answer questions about a system without expanding into adjacent data types.

Navigating the Mainframe Logging Maze: Insights for the Modern IT Professional

Mainframes might seem like relics of a bygone era to many of us in 2024, but the truth, however, is far from that. Despite their reputation as ancient behemoths—and frequent targets of jokes—mainframes continue to be vital powerhouses driving the global economy. Their capability to process billions of transactions daily, including the majority of credit card transactions, underscores their enduring significance.

Charting New Waters with Cribl Lake: Storage that Doesn't Lock Data In

There is an immense amount of IT and security data out there and there’s no sign of slowing down. Our customers have told us they feel like they’re drowning in data. They know some data have value, some don’t. Some might have value in the future. They need some place cost-effective to store it all. Some for just a short while, some for the long haul. But they’re not data engineers. They don’t have the expertise to set up and maintain a traditional data lake.

Delivering Value in IT and Security with Stagnant Budgets

In a recent live stream, Jackie McGuire and I looked into a crucial topic that many IT and security teams face: delivering value in your organization without budget increases. In this age where technology underpins every facet of business, how can teams maximize their impact with finite resources?

A New Approach to the Service Model in the Data Industry

In this livestream, I had a great discussion with Paul Stout and Scott Gray from nth degree about how the service model has evolved from a focus on time and materials to outcome-based services. Watch the full conversation here and leave with a roadmap for improving your next service engagement. Security teams often have a love-hate relationship with onboarding new tools.

Better, Faster, Stronger Network Monitoring: Cribl and Model Driven Telemetry

New in Cribl 4.5, the Model Driven Telemetry Source enables you to collect, transform, and route Model Driven Telemetry (MDT) data. In this blog, you’ll learn how to explore the YANG Suite to understand the wide variety of datasets available to transmit as well as how to configure the tools to get data flowing from Cisco IOS XE network devices to Cribl Stream.

The UK Telecommunication Security Act (TSA): When Life Gives You Lemons, Make Lemonade

On October 1, 2022, the UK Telecommunications Security Act (TSA) went into effect, imposing new security requirements for public telecom companies. The purpose of the act is noble, as it wants to ensure the reliability and resilience of the UK telecommunications network that underpins virtually every aspect of the economy and modern society.