Operations | Monitoring | ITSM | DevOps | Cloud

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

Cycle Time Insight - Demo Den July 2021

Matt, a software developer on the Jira team building all things DevOps, shows off the brand new Cycle Time Insight and talks about how this insight can help your team go from issue deployed faster! Learn more about four key DevOps metrics to understand essential data DevOps teams require to have the visibility and control over their development pipeline.

Rollbar Tip of the Day: Filter by Date Range

Learn how you can filter your items and occurrences by date range in the UI. Rollbar is the leading continuous code improvement platform that proactively discovers, predicts, and remediates errors with real-time AI-assisted workflows. With Rollbar, developers continually improve their code and constantly innovate rather than spending time monitoring, investigating, and debugging.

Announcing WP Activity Log Integration

With over 40% of websites powered by WordPress, there’s a good chance you or someone in your company is using it to update content or manage websites. This is why we’re excited to announce an integration with WP Activity Log—a comprehensive WordPress activity log plug-in—and SolarWinds® Papertrail™.

SouthStar Bank Fixes IT Issues Before Anyone Notices

I recently had the pleasure to talk with Jesse Miller from SouthStar Bank about some amazing IT results they were delivering. Southstar Bank, headquartered in Moulton, Texas — about midway between San Antonio and Houston — is a community bank specializing in residential mortgage, real estate and construction lending, operating 15 full-service branches in rural and urban communities across the Central Texas region.

End-to-End Monitoring of Citrix Infrastructures: FAQs

The webinar included a live demonstration of how our eG Enterprise solution provides an end-to-end view of the Citrix deployment including the Citrix ADCs, Delivery Controllers, License servers, Virtual App servers, Virtual Desktops, and other Citrix tiers including WEM, AppLayering, and others. Citrix Cloud is also supported.

Fashionably Late: The Zero Trust Trend is Here to Stay

I have often joked that IT, and in particular cybersecurity, is like fashion — not a lot is ever new, just reimagined and, in some cases, improved. As I sit pondering the beauty of my COVID-19 comb-over mullet, I have found myself thinking about how this fashion analogy applies to zero trust.

I Pity the Spool: Detecting PrintNightmare CVE-2021-34527

On Monday, June 21st, Microsoft updated a previously reported vulnerability (CVE-2021-1675) to increase its severity from Low to Critical and its impact to Remote Code Execution. On Tuesday, June 29th, a security researcher posted a working proof-of-concept named PrintNightmare that affects virtually all versions of Windows systems. Yesterday, July 1, Microsoft assigned this flaw a new CVE, CVE-2021-34527.