What is Spear Phishing?

Spear phishing is an email spoofing attack targeting a specific organization or individual. Spear phishing emails aim to infect the victim with malware or trick them into revealing sensitive data and sensitive information. Spear phishers look for target who could result in financial gain or exposure of trade secrets for corporate espionage, personally identifiable information (PII) for identity theft and protected health information (PHI) for insurance fraud.


How to Make Prometheus Monitoring Enterprise Ready

Prometheus has become something of a de-facto standard for how to start monitoring Kubernetes. There are good reasons for this: It’s open source, freely available and embraced by the Cloud Native Computing Foundation (CNCF). Also, Prometheus was designed to handle the highly ephemeral nature of Kubernetes workloads. This has propelled Prometheus to a position as the obvious choice for anyone initially wanting to monitor Kubernetes.


OpenTelemetry, OpenTracing, OpenCensus: An Introduction and Glossary

There’s been a fair bit of buzz lately about OpenTelemetry, which is the next major version of the OpenTracing and OpenCensus projects. The leadership of those two projects have come together to create OpenTelemetry, which combines the best parts of OpenTracing and OpenCensus to create one open source project to help with your instrumentation needs.


Study Finds That Code Quality Doesn't Influence Pull-Request Approvals

Pull requests are a staple of open source software. Someone finds a bug or inefficiency within a section of code, and they can submit a “pull request” through Git to the repository owner. The owner can compare the new code versus the original, and if they agree it’s better off with the new code, it’s in. Sounds like an open and shut case for high quality, right?


Using data to amplify the Voice of Customer

If a journey of a thousand miles begins with a single step, a customer’s journey could begin at a myriad of touchpoints from every possible direction. It’s dizzying, but because customer experience is a key differentiator, it’s more important than ever to have a holistic understanding of the customer’s journey from every new touchpoint — across the entire organization. The different parts of your organization need to understand each other.


How to Monitor Redshift Logs with Sumo Logic

In the second installment of our Amazon Redshift series, we covered the different ways you can monitor the performance and disk space of your Redshift servers using tools in AWS. In this final post, we will discuss how you can take your monitoring and logging efforts up a couple of notches by using Sumo Logic with Amazon Redshift.


Avoid DNS Outages: Decrease Downtime with DNS Monitoring

Cloudflare, Amazon, Microsoft, and Google are some of the largest managed Domain Name Server (DNS) service providers in the world. They are also just a few of the many DNS providers that have struggled with DNS outages. In fact, Cloudflare had an outage earlier this year due to a bad software deployment.


Kubernetes 101

The appeal of running workloads in containers is intuitive and there are numerous reasons to do so. Shipping a process with its dependencies in a package that’s able to just run reduces the friction of organizational communication and operation. Relative to virtual machines, the size, simplicity, and reduced overhead of containers make a compelling case.


Top Metrics for Measuring DevOps Delivery Value

Software developers and operations teams are constantly improving the way they move code into production and execute tests to maintain consistent delivery of reliable services. But, how do most organizations track the success of organizational changes? When a company adopts DevOps principles, how do they show the value of these changes to the engineering teams and the overall business?