Operations | Monitoring | ITSM | DevOps | Cloud

Unraveling open port threats and enhancing security with port scanning tools

From exposing your network vulnerabilities to becoming a passageway for intruders, open ports can pose several risk vectors that threaten your network’s confidentiality, integrity, and availability. This is why it’s a best practice to close your open ports. To tackle the risks introduced by open ports, network admins rely on port scanning tools to identify, inspect, analyze, and close open ports in their networks.

Core Web Vitals: Google's Upcoming Ranking Changes

From 1st May 2021, Google will start judging your website based on a new set of performance metrics called Core Web Vitals. This initiative is focused around user experience and will become part of Google’s ranking algorithm. Failing them is bad, getting them right is a huge opportunity. Only 23% of businesses currently pass these tests consistently, so organic SEO will be negatively impacted for the large majority of companies.

10 Best Tools for Monitoring Wireless Access Points

Monitoring wireless access points is business-critical, allowing teams to facilitate day-to-day workflows. These wireless access points (APs or WAPs) provide strong Wi-Fi signals and transmission ranges for sending and receiving valued information. But wireless access points are susceptible to cyberattacks that jeopardize your revenue and reputation.

How to Monitor Network Traffic: Best Tips for IT Pros

What if I told you that monitoring network traffic is a lot less daunting than it actually seems? I think I have your attention. As a network has various moving parts, understanding it all can be a serious challenge. If something breaks or a component stops working correctly, implementing a quick troubleshooting process is essential. If you can't fix the issue right away, this could be detrimental for your end users, leading to more severe complications.

Cisco Network Monitoring: 6 Best Practices

It's often said that your network is the "backbone" of your IT infrastructure, underlying every other part of your enterprise IT. If your Cisco network infrastructure goes down or is experiencing performance issues, it's crucial that you have a real-time solution to identify and resolve the problem as soon as possible. But what does such a solution look like when it comes to Cisco networks?

AWS S3 security with CloudTrail and Falco

One of the major concerns when moving to the cloud is how to approach AWS S3 security. Companies may have moved their workflows to Amazon, but are still cautious about moving their data warehouse. And that is totally understandable. We have all heard about data breaches in companies like Facebook, GoDaddy, and Pocket. It’s important that access to information is done properly, in a limited and controlled fashion, to avoid such breaches.

What's new in Sysdig - March 2021

Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new features to all of our customers, automatically and for free! This month was mostly about compliance and a PromQL Query Explorer! Have a look below for the details. We have added a number of new compliance standards to our compliance dashboards page, making it even easier for our customers to quickly (and continuously!) check how well they’d do from an audit.

How I fell in love with logs thanks to Grafana Loki

As part of my job as a Senior Solutions Engineer here at Grafana Labs, I tend to pretty easily find ways out of technical troubles. However, I was recently having some Wi-Fi issues at home and needed to do some troubleshooting. My experience changed my whole opinion on logs, and I wanted to share my story in hopes that I could open up some other people’s eyes as well. (I originally posted a version of this story on my personal blog in January.) First, some background info.

High throughput VM logging and metrics agent now in Preview

Running and troubleshooting production services requires deep visibility into your applications and infrastructure. Virtual machines running on Google Compute Engine (GCE) provide some system logs and metrics without any configuration required, but capturing application and advanced system data has required the installation of both a metrics agent and a logging agent.