Operations | Monitoring | ITSM | DevOps | Cloud

Protect your Elasticsearch deployments against attacks like "meow bot" - for free

The issue of unsecured databases is growing. In 2019, 17 percent of all data breaches were caused by human error — twice as many as just a year before. And the IBM/Ponemon 2019 report found that the estimated probability of a company having repeated data breaches within two years grew by 31 percent between 2014 and 2019. Why is this happening?

Gremlin

Gremlin aims to make the internet more reliable and prevent costly and reputation-damaging outages. Its failure-as-a-service platform empowers engineers to build more resilient systems through safe experimentation.

Cyber Security: Understanding the 5 Phases of Intrusion

Here at Graylog, we have recently had an increase in conversations with security teams from leading companies. We want to share our key findings with the Graylog community. The good thing is that cybercriminals use a methodical approach when planning an attack. By understanding their process and knowing your network, you will be better prepared and able to stay one step ahead.

Using Cloud Logging on GKE

Looking to debug and troubleshoot your workloads that are on Google Kubernetes Engine? In this episode of Stack Doctor, Yuri Grinshteyn shows you how Cloud Logging ingests your GKE workloads, and what tools allow you greater observability over log data. Watch to learn how you can efficiently retrieve, view, and analyze logs from your queries with Cloud Logging!

Five worthy reads: Remote workplaces: Is hybrid the way to go?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the merits of going hybrid in this era of distributed workforces and remote working culture. While it has become imperative for organizations to implement remote work policies, the question of cloud adoption has become almost unavoidable.

Visualizing VMInsights data in SquaredUp

Following the release of Azure Monitor for VMs in January 2020, some changes have been made to how its performance data is stored in Log Analytics. The most significant of these changes is that this data is now stored in the InsightsMetrics table rather than in the Perf table, as we discussed in our ‘What is Azure VM Insights?’ article.