Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Integrate security into development with Snyk, now a seamless part of Bitbucket Cloud

While PR analysis within Code Insights and Snyk Pipes are available to use right now, we're rolling out a native Security tab in Bitbucket Cloud. This will be a gradual rollout through the month of May so watch out for it in the left nav. We look forward to your feedback. Even small vulnerabilities can cost a team a lot. All too frequently we see news reports of organisations that mishandled their code & build level security, causing customer data to be exposed.

Mattermost plugins: How to set up your developer environment

The goal of this four-part series is to help you learn how to write your own Mattermost plugins for the first time. To kick things off, this article teaches you how to set up your developer environment. My test computer is a five-year-old laptop with an Intel i5 processor and 4GB of RAM. You need at least 30GB of hard disk for this project. Of course, you’ll also need an internet connection. We start with a freshly installed Ubuntu 20.04. You don’t need to install the desktop environment.

Four Key Challenges To Adopting AI/ML In Healthcare (Blog series - Part 2 of 3)

In part 1 of this series, we examined how AI/ML can help improve healthcare. AI/ML is an ambitious undertaking that promises to revolutionize healthcare. Getting excited is easy, but where do you start and why is it not just another empty promise? In fact, despite all these promises and futures, most AI/ML projects fail and don’t deliver. The failure rate of AI/ML projects is starting to make some wonder if this is real or hype.

Security Starts With People, Unfortunately.

One of the findings of our investigations pointed to a compromised account as a possible cause of the cyberoperation. While I was reading the results, I thought, “That could have been me. In fact, it could have been any of our employees,” and I began asking myself what I as an individual could do to increase the security of the company I’m working for. Let’s face it, most of the risk is produced by us humans and our behavior.

Quick Demo: Ivanti UEM for Clients

Some of the many ways that malware, including ransomware, is commonly spread is through malicious attachments to business email, unsanctioned apps downloaded from third-party app stores, drive-by downloads via phishing and pharming attacks, employing brute-force tactics using Remote Desktop Protocol (RDP), and network propagation via SMB and CIFS sharing.

Mobile Devices are Ubiquitous, and so are Cyberattacks

We all like to enjoy untethered freedom, as is shown by the incredible growth of mobile devices we use every day for business and personal activities. We use mobile devices for buying products and services, and banking and investing. We download apps that allow us to connect with our favorite businesses and socially interact with friends and relatives.

Searching through logs with the free and open Logs app in Kibana

Log exploration and analysis is a key step in troubleshooting performance issues in IT environments — from understanding application slow downs to investigating misbehaving containers. Did you get an alert that heap usage is spiking on a specific server? A quick search of the logs filtered from that host shows that cache misses started around the same time as the initial spike.

What Are AWS Lambda Triggers?

This is a basic introduction to Lambda triggers that uses DynamoDB as an event source example. We talk a lot about the more advanced level of Lambda triggers in our popular two-part series: Complete Guide to Lambda Triggers. If you want to learn more, read part one and part two. We’re going back to the basics this time because skipping some steps when learning something new might get you confused. It tends to get annoying, or it can even make you frustrated. Why?

Using Maths to Fight Financial Crime

Financial crime has become a red-hot topic over the last 12 months, as fraudsters have sought to exploit the monitoring gaps between people, process and technology across an ever-widening attack surface – driven by the growth in usage of remote (digital) channels. Even before its recent growth, the cost of fraud and financial crime was significant.

Have Your Say in the new Idea Portal

We’re excited to announce the launch of the all-new idea portal. A place where great ideas can grow, build support, and help shape the future of Auvik. The idea portal allows us to collect your suggestions while keeping you informed of what we’re working on, and what we’re planning to implement next. We can’t wait for your input!