Operations | Monitoring | ITSM | DevOps | Cloud

Detecting Cryptojacking with Progress Flowmon

In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.

Navigating User Experience, Performance & Security

In the ever-evolving digital landscape, where users expect lightning-fast, seamless experiences, a thoughtful balance needs to occur between creating a unique website experience and achieving optimal performance whilst tackling the mounting threats posed by cybercriminals. This predicament places website owners and developers at a crossroads: How can they achieve great user experience (UX) while upholding stringent security protocols with a well-performing website?

Icinga 2 API and debug console

Have you ever experienced configuration issues, such as notifications not being sent as expected or apply rules not matching all expected objects, probably due to an incorrectly set custom variable? Icinga 2 has several options to assist you in such situations. Last time, Julian demonstrated how to analyse such problems using the icinga2 object list command. Today I will show you how to interactively investigate your problem using the mighty Icinga 2 debug console.

5 things to look for in a database monitoring tool

Databases are the backbone of enterprise-level organizations, facilitating efficient data management, supporting critical business processes, and providing a foundation for secure innovation and growth. Effective database monitoring is critical for maintaining a high level of performance, security, and reliability in database systems, particularly in enterprise-level environments where large volumes of data and critical business operations are involved.

Understanding SharePoint Online Licensing and Pricing

Imagine a place where all your work documents, projects, and team collaborations live—a space that’s not just in the office but accessible from anywhere, at any time. That’s SharePoint Online for you. It’s a cloud-based service, hosted by Microsoft, designed to empower organizations to share and manage content, knowledge, and applications.

Closing the Interconnection Data Gap: Integrating PeeringDB into Kentik Data Explorer

Kentik users can now correlate their traffic data with internet exchanges (IXes) and data centers worldwide, even ones they are not a member of – giving them instant answers for better informed peering decisions and interconnection strategies that reduce costs and improve performance.

Optimizing Your Etsy Shop for Art Sales: Strategies for Success

In the expanding world of selling art online, having an Etsy shop is a way to showcase your creativity and reach a global audience. However, with increasing competition, it's important to optimize your shop for visibility and increased sales. This article will provide you with strategies to enhance your Etsy shop for art sales.
Sponsored Post

Threat Hunting Frameworks and Methodologies: An Introductory Guide

Establishing an effective cyber threat hunting program is among the top priorities of enterprise security leaders seeking a proactive approach to detecting and counteracting potential threats. Furthermore, implementing a proactive threat hunting program, security teams that leverage formalized frameworks or threat hunting methodologies are far more likely to detect vulnerabilities or in-process malicious activities in their environments than those that do not. However, data from a 2023 threat hunting survey revealed that while 73% of organizations have adopted a defined threat hunting framework, only 38% actually follow it.