Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Why you need Internet Performance Monitoring (IPM)

A few decades ago, monitoring your application was simple—everything ran on-premises, and performance issues were easier to pinpoint. But today, applications are built on globally distributed services, running across internal and external systems in the cloud, all connected through the Internet. In a world where the Internet is now your network, traditional APM (Application Performance Monitoring) isn’t enough. It only focuses on code and infrastructure, leaving critical blind spots that impact performance, availability, and user experience.

Breaking Down Silos with Correlation and Context

In modern IT environments, data is abundant, but clarity is rare. Enterprises deploy dozens of monitoring tools to collect metrics, events, and logs from across the network, yet when something goes wrong, teams still scramble to connect the dots. Why? Because these data streams exist in siloes, isolated by format, source, or system.

The State of Routing Security: Progress, Challenges, and Measurement

Kentik's Director of Internet Analysis, Doug Madory, explores the current landscape of BGP routing security. He discusses key progress made in Route Origin Validation (ROV), common pitfalls like AS-SET nesting, and ongoing challenges faced by the networking industry. With real-world examples and detailed traffic analysis from Kentik's extensive NetFlow data, Doug shares his insights and recommendations for NetOps professionals who want to improve their routing security practices. Watch this webinar replay to learn the latest methods for securing the global internet.

How HTTPS (HTTP) Proxies Differ from SOCKS5: Understanding Protocol Differences

A proxy server functions as a go-between for the client and the destination server. It's commonly used to bypass content restrictions, boost online security, and improve anonymity. There are several types of proxy protocols available, with HTTP and SOCKS being among the most widely used. But how exactly do they differ-and how should you decide which one to use?

How does observability enhance operations in cloud native voice networks?

The 17th century saw the onset of the Scientific Revolution. It was a time of knowledge explosion. During this time, scientific practices were still evolving, with no universally accepted protocols for data collection and analysis. Individuals documented any observation, resulting in the collection of massive amounts of information, but much of it was hard to leverage to draw useful conclusions. The development of the scientific method provided a common approach to capturing and analyzing data.

Lessons Learned in LLM Prompt Security: Securing AI with AI

AI is no longer just a buzzword. According to a 2024 McKinsey survey, 72% of companies now use AI in at least one area of their business. By 2027, nearly all executives expect their organizations to use generative AI for both internal and external purposes. However, with this rapid adoption comes significant security risks. As organizations rush to implement AI solutions, many overlook a critical vulnerability: prompt security.