Notes from Observability Roundtables

The Velocity conference happened recently, and as part of it we (Honeycomb) hosted a sort of reverse-panel discussion, where you talked, and we listened. You may be aware that we’re in the process of developing a maturity model for the practice of observability–and we’re taking every opportunity we have to ask questions and get feedback from those of you who are somewhere along the path.


Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments, provides deep auditing capabilities across these environments, and comes with advanced security features to deal with all manner of security incidents. In the concluding post of this blog series, we’ll look at another highly essential component of SIEM solutions: integrated compliance management.


Six System and Software Vulnerabilities to Watch Out for in 2019

Wouldn’t it be an easier life if we didn’t have to worry about the exploitation of vulnerabilities in solutions and software on which we have spent good time and resources? A world where correctly configured systems configured were left alone to perform their functions until they became redundant and/or needed replacing? It is a beautiful dream. Sadly, it’s also a highly unrealistic one.


Prevent Wordpress hacking using this Pen Testing guide

Welcome back to the next edition of “Hacking WordPress”. Find Part 1 if you missed it. Let me start with a PSA message. It is illegal to hack, log in to, penetrate, take over or even hack, a system or network of systems without the explicit permission of the owner. Criminal hacking is illegal and punishable under Federal Law. I am describing methods to learn more about WordPress so you can protect your sites better.


HBO's "Chernobyl": Is there a lesson here for IT incident management?

I’m a big fan of historical TV dramas and last week I finished watching the stunning and shattering HBO TV miniseries about the 1986 Chernobyl disaster. As a monitoring expert and a product manager, I have visited dozens of IT operations centers, control rooms and NOCs, so I couldn’t help but compare them to the Chernobyl control room scenes in the show.


Useful tools to manage your application's secrets

When you build and deploy an application, chances are that you need to store some form of secrets. These are typically things like credentials for 3rd party systems and database credentials. As an ASP.NET Core developer, Microsoft provides you with an easy way to store secrets like these in your development environment, namely the Secret Manager.


Monitor JavaScript console logs and user activity with Datadog

Monitoring backend issues is critical for ensuring that requests are handled in a timely manner, and validating that your services are accessible to users. But if you’re not tracking client-side errors and events to get visibility into the frontend, you won’t have any idea how often these issues prompt users to refresh the page—or worse, abandon your website altogether.


The Importance of Combining Your Learning Management System and Customer Support Software

Many businesses are looking for new ways to improve and strengthen their own customer relationships. They’ve hired a great team of account managers, have incredibly knowledgeable support agents, and have provided them with the technology needed to succeed. However, even with a group full of all-stars, getting new employees up to that same level quickly can be a challenge as a company grows.