Operations | Monitoring | ITSM | DevOps | Cloud

Dealing With Ransomware Attacks On Your Business

At its best, technology is an absolute boon for businesses. Simple computing machines make work easier, and making use of networks provides you with connectivity that allows you to quickly reach entities within and without your business. However, technology isn't invulnerable. Truth be told, ransomware attacks are on the rise in 2021. In the first half of the year, there had been more than 149 confirmed cases of Ransomware attacking businesses around the world.

VoIP Service Provider and Titanium 3CX Partner, Amplisys, uses Obkio to Monitor End-User Network Performance

Learn how Obkio works with 3CX partner and VoIP Provider, Amplisys, to create a streamlined network monitoring and troubleshooting process to quickly and proactively support every one of Amplisys’ VoIP customers for impeccable customer satisfaction and support.

CVE-2021-38379 & CVE-2021-36756

The CFEngine engineering team has recently discovered two security issues in the CFEngine Enterprise product: While the latter one (CVE-2021-36756) only affects CFEngine Enterprise deployments using the Federated Reporting functionality, the former one (CVE-2021-38379) affects all deployments running all supported versions of CFEngine Enterprise (and many unsupported versions, 3.5 or newer, to be more precise).

How Debian Cron Handles DST Transitions

When the Daylight saving time starts, and the computer’s clock jumps forward, what does cron do? If the clock jumps from 1AM to 2AM, and there is a job scheduled for 1:30AM, will cron run this job? If yes, when? Likewise, when the Daylight saving time ends, and the clock jumps backward, will cron possibly run the same scheduled job twice? Let’s look at what “man cron” says.

What is Core Web Vitals and How to Monitor It

It used to be simple to improve the performance of a website. However, the introduction of client-side JavaScript has opened up a whole new world of ways for websites to be painfully slow. Measuring this increased slowness will require the development of new measurements. They're known as the Core Web Vitals by Google. Google announced Core Web Vitals in May 2020, a set of three indicators that serve as the gold standard for evaluating a website's user experience.

Streaming Auth0 Logs to Datadog | Sivamuthu Kumar (Computer Enterprises, Inc.)

Are you using Auth0 in your application for user logins? How will you monitor the Auth0 logs and detect user actions that could indicate security concerns? In this session, we will see how Datadog helps you to extend security monitoring by analyzing Auth0 User activities in the logs. And also we will see how to set up threat detection rules to trigger notifications automatically based on them.

Maintaining Operational Sanity Across 100+ AWS Accounts | Eric Mann / Ryan Tomac (Vacasa)

At Vacasa, AWS accounts represent the unit of isolation for distinct applications & services in our software ecosystem, providing security benefits and operational autonomy for our teams as we scale. Managing accounts at this scale requires strong DevOps practices to maintain security, operational sanity, and uniform observability across the system. In this talk, we’ll cover the benefits of such an approach, the practices that make it possible, and the important role Datadog plays.

Democratizing Delivery: Seamless Observability for Optimal Application Performance |Ekim Maurer(NS1)

When application delivery performance issues happen, observability is critical to diagnosing the problem at hand. The adage “it’s always DNS” means that observability must extend to the foundational layers of the application delivery and access networking stacks. Yet granting administrative access to core network services like DNS and DHCP may run contrary to an organization’s least-privileged access policies. In this session, attendees will learn how global internet companies and enterprises use NS1 and Datadog to provide democratized DNS observability and reach optimal application performance.

Observability for Service Organizations | Bart Scheltinga (RawWorks)

Observability is trending. Organizations that rely on cloud infrastructure and cloud applications prioritize observability initiatives to get control over their business’s applications. At the same time, we see the “gap” between the on-premises infrastructure and “non-cloud” infrastructure is becoming bigger. Examples are End User Computing (EUC) and Global networks (SD-WAN).