Operations | Monitoring | ITSM | DevOps | Cloud

Quick Demo: Leaky App Detection and Remediation

Here's a quick two-minute video demonstrating the power of Ivanti's UEM for Mobile and Mobile Threat Defense and this time detecting a leaky app, specifically the very popular video-sharing TikTok app. Tiktok has had a history of vulnerabilities where the personal information of users was exposed and could have potentially been harvested and leaked out by malicious cyber threat actors.

Messy AWS Tags? Confidently Allocate Costs Without a Perfect Tagging Strategy

AWS tags are a bit like flossing your teeth every day — or getting eight hours of sleep a night. Everyone agrees they’re good habits that will make life easier down the road. But sometimes life gets in the way, and those habits fall a little short. Most teams set out with the intention to tag their infrastructure, but in our experience, it’s rare that companies have a perfect, thorough AWS tagging strategy.

A Day in the Life: Intelligent Observability at Work with our SRE, Dinesh

When I asked Charlie for permission to attend this year’s AICon (virtual, natch) I thought it would be a shoo-in; learning’s part of my OKRs after all. But he never makes things easy and his ‘yes’ came with a caveat that’s typical when dealing with him. This time, he claimed he didn’t have the budget for the ticket (a likely story!) and I’d have to find another way to get one.

End of AWS Lambda support for Node.js 10: Should you switch from v10 to v14?

It’s the end of AWS Lambda support for Node.js v10. AWS Lambda support for Node.js 10 is due to end in August 2021. It’s time to switch! In this article, we’re discussing and comparing the differences of working with Node.js 10 and Node.js 14 + AWS Lambda, the impacts, and benefits of this change. AWS Lambda supports multiple versions of programming language runtimes, but not forever.

DarkSide Ransomware: Splunk Threat Update and Detections

The ransomware campaign against the Colonial Pipeline highlights the dangers and real-life consequences of cyberattacks. If you want to understand how to use Splunk to find activity related to the DarkSide Ransomware, we highly recommend you first read “The DarkSide of the Ransomware Pipeline” from Splunk’s Security Strategist team. In short, according to the FBI, the actors behind this campaign are part of the “DarkSide” group.

WTF is Incident Management? Post-Panel Wrap-Up

That's a wrap! We hosted "WTF is Incident Management" on May 12, 2021. We invited four very knowledgeable panelists to discuss how they define incident management, what changes they'd make if they could start again from scratch, how to manage team stress after an incident, and other subjects. Our panelists were: host Matt Stratton (Staff Developer Advocate at Pulumi), Emily Ruppe (Incident Commander at Twilio), Alina Anderson (Sr.

Cyber Defense Magazine Names ChaosSearch "Cutting Edge" in Cybersecurity Analytics

Exciting news — ChaosSearch won the 2021 InfoSec “Cutting Edge in Cybersecurity Analytics” award from Cyber Defense Magazine! We’re honored to be recognized for our innovation in delivering security insights at scale. The InfoSec panel of judges is made up of certified security pros who understand what SecOps teams care about and how log analytics should be applied to keep data secure.

How to Monitor Server Performance

Server monitoring is important for optimum server performance to ensure no disruptions to your business. However, server performance monitoring can be dispersed and complex. Keeping an eye on everything has become an uphill battle. Information on the server allows you to better understand what went wrong. Tools, like Retrace, that make this uphill battle more streamlined and manageable. Let’s learn how to monitor server performance.

Introduction to open source private LTE and 5G networks

It’s so easy these days to set-up your own WiFi network. You order a router online, plug it into the electrical socket, define a password and you’re good to go. WiFi is fast, reliable and easy to use. But if you want to cover a wider area or connect hundreds of small devices it quickly becomes inefficient and expensive. Is the only way to go to your local mobile network operator and sign a contract? No! Thanks to open source technology, you can build your own LTE or 5G network.

The State of Robotics - April 2021

Together we have reached the end. Two partners, two allies, two distributions that supported millions of innovators have reached their end-of-life (EOL). April will be remembered as the month where ROS Kinetic and Ubuntu Xenial reached EOL. ROS Kinetic is one of the most used, widely deployed and extensively contributed ROS distributions (1st with 1233 repos in ros/rosdistro). Released in 2016, it supported newer related components, notably Gazebo 7 and OpenCV 3, and this month has reached its end.