Operations | Monitoring | ITSM | DevOps | Cloud

A quick guide to the New Zealand Privacy Act 2020 for DBAs

December 1 saw the introduction in New Zealand of the Privacy Act 2020 which not only brings increased protection for individuals but also has some new implications for businesses, including increased fines for non-compliance and the reporting of serious privacy breaches.

Top 3 New Highlights of Ivanti Endpoint Security

With cybercriminal attacks becoming smarter and more difficult to prevent, traditional authentication methods using username and password have become less secure. This is mainly due to techniques such as account takeovers and brute force attacks. Multi-factor authentication is now considered to be one of the most effective ways to provide authentication security. Ivanti Endpoint Security 8.6 introduces multi-factor authentication for accessing the Console.

Containers vs Virtual Machines (VMs)

As microservices gain in popularity, containers have become a hot topic for developers. But how do they differ from virtual machines? Will containers replace virtual machines? And when should you choose containers over virtual machines? When it comes to defining virtual machines, the name says it all – machines (servers or desktops) that have been virtualized.

Sourcepoint - Scaling Business and Optimizing Customer Journey with Catchpoint

Sourcepoint, founded in 2015, works with both sellers and buyers of media and data, including marketers, heads of advertising operations, and privacy professionals. Sourcepoint provides solutions that ensure compliance with privacy regulations like GDPR and CCPA while helping its clients optimize revenue.

What Gartner Gets Right About Cloud Cost Optimization (and Where They Miss)

Earlier this year, Gartner published “How to Manage and Optimize Costs of Public Cloud IaaS and PaaS,” by analysts Marco Meinardi and Traverse Clayton. As a company that is focused on enabling engineering teams with cloud cost intelligence, we were of course curious what they had to say. Now, if you are familiar with Gartner, you know they have a reputation for serving enterprise clients, so they can sometimes be — well, enterprisey.

We achieved ISO/IEC 27001

We live in an uncertain world and monitoring should try to make sure that whatever happens we will always be informed. Therefore, security is the basis of everything in monitoring and for us it has always been one of the pillars of our strategy as a product. Security is not a technology, it is a way of thinking and acting, we could even say that it is an attitude. For years we have attended international fairs, events where computer security is offered as specific products.

Monitoring and security: an open marriage

Confidentiality, integrity and availability are the three basic laws of security. Availability is a kind of wayward son who becomes prodigal when he likes to, even if it is just to write eulogies with it when the systems go down, although the truth is that it is the most neglected out of the three of them and perhaps that is why monitoring has become more approached for what it may come from outside than what it is inside.

Combining supervised and unsupervised machine learning for DGA detection

It is with great excitement that we announce our first-ever supervised ML and security integration! Today, we are releasing a supervised ML solution package to detect domain generation algorithm (DGA) activity in your network data. In addition to a fully trained detection model, our release contains ingest pipeline configurations, anomaly detection jobs, and detection rules that will make your journey from setup to DGA detection smooth and easy.