Operations | Monitoring | ITSM | DevOps | Cloud

How to Defend Your Business Against SQL Injections

One of the oldest (but often neglected) security vulnerabilities is SQL injection. One common scenario goes like this: An unsuspecting programmer writes an application that accepts input from the user which serves as a parameter to retrieve or store data from a database (e.g., a web login form). The programmer writes a dynamically populated SQL query inside the app, based on user input like username and password (see Image 1 for reference).

Magecart - A Victim's Perspective

We’ve discussed Magecart very frequently in recent months and it’s getting worse, with new attacks coming to light on a weekly basis. At RapidSpike, we are committed to raising exposure on these types of attacks and educating companies as to how they can effectively detect data breaches and reduce their exposure to them.

YC leads $50M Series B in Mattermost as open source Slack alternative

Today, we’re delighted to announce that Y Combinator Continuity is leading a $50M Series B investment in Mattermost as an open source alternative to Slack and Microsoft Teams. With today’s announcement, Mattermost becomes YC’s largest ever Series B investment, and more importantly, their largest open source investment to date. YC is joined by our existing investors, Redpoint and S28 Capital, and new investor Battery Ventures.

Oetker Digital Migrates from Hipchat to Mattermost and Accelerates Digital Transformation

After migrating from Hipchat to Mattermost, Oetker Digital was able to innovate faster for its legendary parent company. The platform helped globally dispersed teams stay unified, productive, and focused as they collaborated on bold new digital initiatives for the enterprise.

Monitoring Machine Learning Models Built in Amazon SageMaker

Many data science discussions focus on model development. But as any data scientist will tell you, this is only a small—and often relatively quick—part of the data science pipeline. An important, but often overlooked, component of model stewardship is monitoring models once they’ve been released to the wild. Here we’ll aim to convince any unbelievers that monitoring deployed models is as important as any other task in the data science workflow.

OpsRamp Presents at Cloud Expo Santa Clara

Come and learn the latest best-practices on artificial intelligence, cloud management, and the rise of the data-driven IT organization. Global public cloud spending worldwide has now topped $200 billion, according to Forrester Research. Organizations are moving to the cloud at a breakneck pace, looking for agility, flexibility, reliability and cost control.

Intro to NGINX

If you've been following along with my posts, you have a sound introduction to Apache Web Server, how it functions, it's place in history, and how Sumo Logic can help you sort through the numerous logs provided. Apache Access and Error logs are integral to understanding the traffic patterns and issues your users face when accessing your web applications. Sumo Logic helps administrators parse through logs, isolate issues, and determine the root causes of errors.

The Complete Guide to Azure Monitoring

Monitoring an Azure environment can be a challenging task for even the most experienced and skilled team. Applications deployed on Azure are built on top of an architecture that is distributed and extremely dynamic. But all is not doom and gloom. Azure users have a variety of tools they can use to overcome the different challenges involved in monitoring their stack, helping them gain insight into the different components of their apps and troubleshoot issues when they occur.

Understanding Heroku Error Codes with Scout APM

If you are hosting your application with Heroku, and find yourself faced with an unexplained error in your live system. What would you do next? Perhaps you don’t have a dedicated DevOps team, so where would you start your investigation? With Scout APM of course! We are going to show you how you can use Scout to find out exactly where the problem lies within your application code.

Grafana Tutorial: Simple Synthetic Monitoring for Applications

Often there’s a focus on how a service is running from the perspective of the organization. But what does service health monitoring look like from the perspective of a user? There are many metrics that indicate the overall health of a container, vm, or application, but independently they do not indicate if the system is functioning correctly. Often these metrics (CPU, disk, memory) are too narrow, and they can be poor indicators. High CPU may be desirable or bursts of memory usage may be normal.