Jul 18, 2019   |  By Sam Jenkins
AWS CloudWatch allows you to collect log files such as the Apache2 access or error logs from your AWS EC2 instances. This is especially useful if you have a scaling group of instances behind a load balancer. Rather than connecting to each instance and manually searching the logs with grep, CloudWatch centralises the logs into one log stream, allowing you to search all your log files from one place.
Jul 11, 2019   |  By Robin Hill
The other day whilst using a very popular website I came across a series of 404 unavailable page messages. I didn’t think much about it at the time but on reflection it made me wonder how many people actually understand what different error codes mean? Hands up, I only know a few and I work in the website monitoring sector. To most, it just means a weird IT message when things go wrong.
Jul 8, 2019   |  By Georgina Grant-Muller
Read the latest news on Magecart attacks! We’ve trawled the web for the latest news of data breaches, including updates on previous attacks. Now featuring insider insights from our own Security Researcher! Latest attacks: New! Major Attack on US Medical Debt Collection company American Medical Collection Agency (AMCA). Their payment portal was compromised for 8 months from August 1st, 2018 to March 30th, 2019.
Jul 1, 2019   |  By James Tyler
This post will describe how to manually build a Ubuntu 18.04 Virtual Machine (VM) server using Oracle’s VirtualBox virtualisation software. Being able to build simple, expendable VMs is extremely useful, whether you’re writing software, building websites or just wanting to learn about Linux servers. We need to be able to SSH onto the server from our host machine to make access easier. To gain SSH access we therefore need to forward SSH’s port to our host.
Jun 26, 2019   |  By Kelsi Anderson
When we think of an apprentice, we think of one of two things; the TV show ‘The Apprentice’ with Lord Sugar or, someone who gets stuck with the job of making the tea and coffee. These are pretty accurate, but neither of these is the actual truth in today’s world.
Apr 25, 2019   |  By RapidSpike
Here's our event for Leeds Digital Festival 2019; Fantastic Data Breaches and How to Prevent Them.
Apr 2, 2019   |  By RapidSpike
RapidSpike's NEW FEATURE - Alerts Delivery Method: Thor
Dec 12, 2018   |  By RapidSpike
Our new Data Breach monitor can cut down attack detection time from 12 days to 5 minutes.
Aug 30, 2017   |  By RapidSpike
Our Add New wizard lets you fully assure your online business in under 30 seconds.
Sep 29, 2015   |  By RapidSpike
Even a 1 second delay could drastically cut your conversion rates.