Tracking Systems Metrics with collectd

System administrators hold many key responsibilities within an IT organization. Most importantly, they must ensure that all systems, services, and applications are up, running, and performing as expected. When a system starts to lag or an application is down, the system administrators are called upon to troubleshoot and resolve the issue as quickly as possible to limit the impact on customers.


Securing Sensu 101

Because monitoring requires some degree of access to your applications, it’s important that you take certain steps to ensure the right amount of access without compromising your app’s security. In this first in a series of posts, we’ll go over some high-level best practices to securing Sensu, followed by a webinar later this month which will offer a deeper dive into setting up certificates.


Log Formats - a Complete Guide

Log management software operates on the basis of receiving, storing, and analyzing different types of log format files. There are several of these standardized log formats that are most commonly generated by a wide assortment of different devices and systems. As such, it is important to understand how they operate and differ from one another so that you can use them the right way, as well as avoid some common mistakes.


Best-of-both-worlds log management

There is an impulse among security departments to use only one solution for log management at a time, but is that really the best option? You don’t have to stick to one solution at a time, throwing out your old solution in order to gain the new features you need. Humio’s low-cost fixed rates shift the paradigm, enabling users to run it alongside other solutions and stay within their budgets — while logging everything and getting answers from all their data.


Alien Labs 2019 Analysis of Threat Groups Molerats and APT-C-37

In 2019, several industry analyst reports confused the threat groups Molerats and APT-C-37 due to their similarity, and this has led to some confusion and inaccuracy of attribution. For example, both groups target the Middle East and North Africa region (with a special emphasis on Palestine territories). And, they both approach victims through the use of phishing emails that contain decoy documents (mostly in Arabic) and contain themes concerning the political situation in the area.


Everything You Need to Know About the Grafana-Prometheus-GitLab Integration

You probably missed it. Don’t feel bad. It was just one small paragraph, buried in the GitLab 11.9 Omnibus Release Notes: Grafana is now bundled in our Omnibus package, making it easier than ever to understand how your instance is performing. “Omnibus” is what GitLab calls its main installation package, and “Grafana” is the time-series visualization software, but what does this paragraph even mean?


Elastic SIEM for home and small business: Beats on CentOS

Hey, there. This is part five of the Elastic SIEM for home and small business blog series. If you haven’t read the first, second, and third blogs, you may want to before going any further. In the Getting started blog, we created our Elasticsearch Service deployment and started collecting data from one of our computers using Winlogbeat. In the Securing cluster access blog, we secured access to our cluster by restricting privileges for users and Beats.

super monitoring

8 Mobile Apps That Help You Create Content With Unique Features

Creating content for your website is like decorating the interior of your new house, if you don’t get it right, you would have your visitors dissatisfied and see them leave! Whether it is business or life, time is of the essence and the biggest currency in modern times. So, how can you create unique content, coping up with your busy schedule and other projects? It is quite simple, and you can go mobile! How?


From GDPR to CCPA, the right to data access is the achille's heel of data privacy compliance and customer trust - Part 2

In the first part of this series, I explained what is DSAR and why the organizations should care about it. Now, let’s take a look at how the process can be perceived by the customers. Our recent GDPR benchmark research shows that the road can be tortuous.