Operations | Monitoring | ITSM | DevOps | Cloud

How to Define Your Security Posture, and Why it Matters

Not only do cybersecurity organizations need to deliver the level of security required to protect corporate assets, they also need to align with the strategic goals and objectives of the business. By defining, establishing and managing your organization's cybersecurity posture, you can deliver the results needed for the business to be successful.

Splunk AR: Taking Remote Collaboration To The Future is Already Here

The Splunk Augmented Reality (AR) team had an amazing experience developing all the new features we launched at .conf20. If you haven’t seen it, we highly encourage you to watch the AR .conf session and see the new features in action. After, you’ll probably share it with your colleagues because of how cool it was! :) Today we want to highlight Remote Collaboration in Splunk AR — we’ve taken “collaboration” to the next level.

How to Add a Data Node to your Elasticsearch Cluster

Have you ever had trouble working with Elasticsearch clusters? You’re not alone. In this post, I will discuss a problem I’ve encountered working with large Elasticsearch clusters and how I solved it. I will share a lot of knowhow on major technical Elasticsearch concepts, some diagrams for illustration, and of course a cool solution! In particular, I will go into Elasticsearch nodes, indices, and shards.

JFrog Support Providing Next Level Artificial Intelligence (AI) Experience

Let me share with you my story about finding the right AI Solution to improve our support self service. The starting point of my journey was pretty common, many will read this and think “Yes! I suffer the same pain”. At JFrog we produce tons of relevant and clever documentation. It’s all out there, available. And yet, we struggle to get to the right piece of information when looking for something specific.

How fast should a website load?

Without a doubt, website owners in 2020 have had to reassess the speed of their websites and probably more critically than any other year. Yes, the stay at home directive in force around the world due to COVID-19 concerns made a lot of people gravitate more towards the use of the internet. During the lockdown, people from all over the world tended to spend a tremendous amount of time visiting various websites for both business and entertainment.

Five worthy reads: The rise in credential stuffing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye. Credential stuffing is perhaps the simplest form of cyberattack, but it continues to make headlines despite its lack of sophistication. It has become the attack method of choice for cybercriminals primarily because of its high success rate and ROI.

Close to wrapping up 2020

There are 6 weeks left of 2020, which means it’s about time we wrap this year up, focus on what’s most important, and leave the nice-to-have endeavors for next year. For Monitive, that means finalizing all the features that our users need to completely migrate from the (now old) Monitive Classic to the new and shiny Monitive. We’re sunsetting Monitive Classic just before Christmas, so my number one goal is to ensure that every user only has downtime that they know about.

The Best MySQL Monitoring Tools & Software of 2020

Evolving MySQL operations requires understanding how MySQL works. A good monitoring tool alerts on issues before they impact end users and helps reduce the MTTR of incidents when they do occur. But choosing a database monitoring solution can be tough due to the vast number of solutions available, each with their own pros and cons. In this blog post, I’ll review some of the best MySQL monitoring tools available that can help measure and improve database performance.

Calico Delivers "Wow Effect" with 6x Faster Encryption than Any Other Solution... Confirms Leadership in Latest Independent CNI Benchmark Tests

Benchmark tests measure a repeatable set of quantifiable results that serve as a point of reference against which products and services can be compared. Since 2018, Alexis Ducastel, a Kubernetes CKA/CKAD and the founder of InfraBuilder, has been running independent benchmark tests of Kubernetes network plugins (CNI) over a 10Gbit/s network. The latest benchmark in this periodic series of tests was published in September, and was based on CNI versions that were up-to-date as of August 2020.