tripwire

How to Implement an Efficient Cloud Security Strategy: The Experts Guide

According to IBM, 98 percent of companies will be using multiple hybrid cloud environments by 2021. This trend isn’t surprising. There are many benefits to operating in the cloud such as improved productivity, an increase in elasticity and huge cost-savings, to name a few. However, we keep seeing a range of issues when it comes to cloud security.

nuweba

Machine Learning Functions - Nuweba vs AWS Lambda

In this blog post, I will examine the performance of machine learning functions in AWS Lambda compared to Nuweba. In addition, I will demonstrate how to overcome the difficulties of deploying a simple Inception model to AWS Lambda to classify images using TensorFlow. Imagine you want to create a simple API endpoint that receives an image (uploaded or by URL) and outputs the detected class to the client using a trained AI model. Sounds pretty useful, right?

stackify

Here's How to Calculate Elapsed Time in Java

Many things in programming sound like they should be easy, but are quite hard. Calculating elapsed time in Java is one of those. How hard could that be? As it turns out, it can be tricky. For starters, we have the fact that time itself is a tricky concept. For a quick example, remember that many places around the world observe Daylight Savings Time. Failing to take DST into account when you should, can and often does result in incorrect calculations.

epsagon

Tips for Running Containers and Kubernetes on AWS

Docker has taken the world by storm over the past few years. It’s fair to say that it has revolutionized the way applications are built, shipped, and deployed. In order to manage your Docker containers, you do need an orchestration tool, as doing everything manually is impractical and prone to error. But the downside of all the benefits such architectures bring is an inherent complexity. Indeed, there are now two layers to look after: the containers and the servers running those containers.

spambrella

Everything you Need to Know about Phishing...

Considering we now spend more and more time online, it’s only natural that we’ve digitised almost every aspect of our daily lives. But in doing so, we may have opened ourselves up to a new and dangerous form of attack. Ever since we began using the internet, we have faced the risk of malicious activity. Fortunately, we’ve developed powerful tools to combat cyber-attacks and advanced email security services.

time doctor

Introducing Activity Summary Report and Payroll Functionality

Check out the latest Time Doctor 2 updates! To help you compare how different users work and spot any potential problems, we’ve added a new report that provides a range of data such as the percentage of manual, idle, mobile, and unproductive time for each user. ​

splunk

Splunk Connect for Syslog: Turnkey and Scalable Syslog GDI - Part 2

In part 1 of this series, we explored the design philosophy behind Splunk Connect for Syslog (SC4S), the goals of the design, and the new HEC-based transport architecture. In this installment, we'll cover the high-level configuration of SC4S and highlight relevant sections of the documentation that provides the details needed for deployment in a production environment.

splunk

Splunk Connect for Syslog: Turnkey and Scalable Syslog GDI - Part 1

In my 8+ years here at Splunk, some questions from customers and the Splunk professional community are repeatedly asked year after year, and questions around syslog data and how to onboard it properly is a prime example. A key question that “refuses to die” is: As an Admin, how do I easily ingest syslog data, at scale, while removing the requirement of up-front design work and “syslog-fu”?

qlik

"The Expanse" (...of Data)

Back in my college years, I used to listen a lot to the English rock band The Sisters of Mercy. One of my favourite songs is called “More” from the album “Vision Thing.” Singer-songwriter Andrew Eldritch wrote the track around love, lust and broken relationships; his brooding tones repeatedly hammers out the demanding line “I want more” – a line which rings true today for our never-ending lust for data.

stackrox

StackRox + PagerDuty - Know about Your Kubernetes Security Issues, Now

StackRox has pioneered Kubernetes-native container security, bringing rich context and infrastructure-native enforcement to protecting Kubernetes and containers across build, deploy, and runtime. We recognize the importance of getting critical alerts about this cloud-native stack to the right team, at the right moment – by integrating with PagerDuty, we broadened the choices on how to do so.