bigpanda

HBO's "Chernobyl": Is there a lesson here for IT incident management?

I’m a big fan of historical TV dramas and last week I finished watching the stunning and shattering HBO TV miniseries about the 1986 Chernobyl disaster. As a monitoring expert and a product manager, I have visited dozens of IT operations centers, control rooms and NOCs, so I couldn’t help but compare them to the Chernobyl control room scenes in the show.

alienvault

Prevent Wordpress hacking using this Pen Testing guide

Welcome back to the next edition of “Hacking WordPress”. Find Part 1 if you missed it. Let me start with a PSA message. It is illegal to hack, log in to, penetrate, take over or even hack, a system or network of systems without the explicit permission of the owner. Criminal hacking is illegal and punishable under Federal Law. I am describing methods to learn more about WordPress so you can protect your sites better.

tripwire

Six System and Software Vulnerabilities to Watch Out for in 2019

Wouldn’t it be an easier life if we didn’t have to worry about the exploitation of vulnerabilities in solutions and software on which we have spent good time and resources? A world where correctly configured systems configured were left alone to perform their functions until they became redundant and/or needed replacing? It is a beautiful dream. Sadly, it’s also a highly unrealistic one.

manageengine

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments, provides deep auditing capabilities across these environments, and comes with advanced security features to deal with all manner of security incidents. In the concluding post of this blog series, we’ll look at another highly essential component of SIEM solutions: integrated compliance management.

honeycomb

Notes from Observability Roundtables

The Velocity conference happened recently, and as part of it we (Honeycomb) hosted a sort of reverse-panel discussion, where you talked, and we listened. You may be aware that we’re in the process of developing a maturity model for the practice of observability–and we’re taking every opportunity we have to ask questions and get feedback from those of you who are somewhere along the path.

User Stories: ChatOps Demo (feat. Sococo, Lita, and Rundeck)

Rundeck began in 2010 as an open source project created by founders Damon Edwards, Alex Honor, and Greg Shueler. The Rundeck software platform was built to let operations run more efficiently, scale faster, and maintain security. We call it Self-Service operations and it’s transforming the way Operations runs at organizations of all sizes across every industry. Learn more about Rundeck here: https://www.rundeck.com/what-is-rundeck

Automated App Discovery - CloudHedge Discover

Using Application X-Ray, CloudHedge's Discovery tool automatically discovers Windows IIS and Linux applications within minutes instead of days or weeks. Post discovery process, the tool showcases all the relationships and dependencies between services, processes, and hosts which are necessary for containerization on a user-friendly dashboard. CloudHedge’s Discover tool supports enterprise Windows and Linux operating systems right from Windows 2003, Java, .Net, PHP, Python, JBoss, TomCat type of applications.
datadog

Monitor JavaScript console logs and user activity with Datadog

Monitoring backend issues is critical for ensuring that requests are handled in a timely manner, and validating that your services are accessible to users. But if you’re not tracking client-side errors and events to get visibility into the frontend, you won’t have any idea how often these issues prompt users to refresh the page—or worse, abandon your website altogether.