Operations | Monitoring | ITSM | DevOps | Cloud

5 Things to Know When Choosing Open Source SIEM Tools

Security Information and Event Management (SIEM) tools focus on insights into IT environments and tracking records of all their operations. These IT environments can be application infrastructures, physical networks, and cloud networks. SIEM initially evolved from the log management discipline, which involved integrating security events with security information to collect, analyze, and report on activities in networks.

Learn Grafana: Share query results between panels to reduce load time

As you add more panels to your dashboard, more requests are being made, potentially leading to your dashboard taking longer to load. While you can limit the data requested in each query, one of the best ways to reduce the loading time is to reduce the number of requests being made to the data source. Grafana makes a data source query for each panel in your dashboard, even if those queries are identical.

Our 2021 community-driven roadmap

Hello everyone, I’m Saiyam – amongst other things I’m a CNFC Ambassador, an Influx ACE, and as of the last few weeks, now Director of Technical Evangelism here at Civo. With Civo being a fast-paced start-up in an even faster moving industry, everyone here has a “all-hands-on deck” approach and wears many hats. My role is no exception. One of the early tasks that I am getting to grips with (in line with our focus on community) is revamping our suggestions section.

Sumo Logic Cloud SIEM overview

Sumo Logic's Cloud SIEM solution provides security analysts with enhanced visibility to seamlessly monitor their on-prem, hybrid, and multi-cloud infrastructures and thoroughly understand the impact and context of an attack. In addition to supporting a wide spectrum of security use cases, including audit & compliance, Sumo Logic fused analytics and SOC automation to perform security analyst workflows and automatically triage alerts—increasing human efficiencies and enabling analysts to focus on higher-value security functions.

Building a Zero-Trust Model With SolarWinds Security Tools - SolarWinds Lab Episode #92

The zero-trust model is critical for building a successful strategy to detect both internal and external cybersecurity threats. This approach requires setting and maintaining strict access controls and "no trust" as the default to all, including those already inside your network. There are several steps needed to properly evaluate your organization's current state before you can start implementing best practices.

Asynchronous Javascript: From Promises to Async/Await

Javascript is a funny language. It claims to be (and very much is) a single-threaded language (i.e., it executes statements in order, one at a time, one after another, in a synchronous fashion). Despite just having the one native thread to work with, it somehow allows you to write concurrent, asynchronous code that is non-blocking in nature.

Exciting new features of Coralogix STA

We at Coralogix, believe that cloud security is not a “nice-to-have” feature – something that only large organizations can benefit from or are entitled to have. We believe it’s a basic need that should be solved for organizations of any shape and size. This is why we built the Coralogix Security Traffic Analyzer (STA) tool for packet sniffing and automated analysis. Today we’re announcing several new features to our security product you’ll find interesting.