Operations | Monitoring | ITSM | DevOps | Cloud

Using Private Threat Intelligence Feeds on Hidden Security Attacks with Logz.io

Oftentimes, security attacks that were clearly recorded in logs go unnoticed. They are obscured by a large sea of log data created by most modern cloud environments. In some cases, like during a DDoS attack, there will be a huge spike in logs so it will be very clear what happened. In other situations, just a few logs will document the attack. Finding these logs can be like finding a needle in a hay stack. But if you know what to looks for, it doesn’t need to be so hard to spot these attacks.

Secure and monitor your containers on Bottlerocket from AWS

Sysdig is pleased to support AWS today in their GA launch of Bottlerocket, a special-purpose operating system designed for hosting Linux containers. Orchestrated container environments run potentially hundreds of compute nodes. Operating general-purpose Linux on container hosts introduces complexity for IT teams who must patch and update packages across their clusters. Worse, features and packages that are not necessary for running containers, introduce unnecessary security exposure.

Monitoring eCommerce - How to keep your Customers !!

Digital shopping has exploded over the last few months to levels no one could have planned for. Any kind of performance issue can negatively impact an eCommerce site and cause a drift in loyalty, bounce rates to go up and user conversions to go down. Not to mention how outages or slow page loading impacts employee productivity. In today’s tip, I’ll be going over the many traps that lie in wait that can steal away your eCommerce customers and why shifting to a proactive monitoring mindset is so important.