Operations | Monitoring | ITSM | DevOps | Cloud

%term

How to identify malicious IP activity using Falco

One of the most common security use cases, is the ability to identify connections generated by malicious actors, or internal components connecting to suspicious servers (e.g malware C&Cs). In this post, we will show how to leverage the Falco engine, to identify connections made to IPs that were flagged by multiple security sensors, and are streamed as a feed to the Falco engine.

Conquer it with correlation-Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT is just one ugly face of a much larger epidemic: the data breach. In this blog, we examine this larger problem and the role of event correlation in securing sensitive data.

5 secrets design-led companies know about boosting customer value

Just when you think you’ve got this whole “knowledge economy” thing figured out, here comes the “creative economy” – the world in which your ability to succeed and add value is limited only by your imagination. Of course, that creativity needs to be informed by a deep understanding of your customers.

The Evolution of CI/CD and Agile

It’s nearly the end of 2018 and we still discuss CI/CD and agile as separate concepts. The truth is, the line between them is blurring. Doing either or both well is very difficult. In fact, many organizations struggle to effectively execute an agile workflow, or reach CD because they are so difficult to do well. This article focuses on why it is so important to keep striving toward this gold standard duo because CI/CD and agile result in quality and predictability.

Monitoring Microservices: IT's Newest Hot Mess

In this THWACKcamp session, you’ll learn how microservices are different from other applications, when performance bottlenecks most often occur, how they tend to break, and where you can add monitoring to stay ahead of trouble. You’ll also see how to extend existing infrastructure dashboards to include microservice workloads, cut troubleshooting time, and include new business metrics that measure the business goals driving microservices in the first place.

Six Ways to Improve Your Security Posture Using Critical Security Controls

Security policies within organizations are under a lot of scrutiny in today's times. Trying to stay up to date with these policies can create stress to users and the IT staff managing the infrastructure. Just like network standardization is a must, so is security standardization.