Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

5 tips to avoid cyberattacks on EdTech platforms

As the COVID-19 pandemic rages on, many educational institutions have been forced to shift their on-campus classes to online classes. Various EdTech platforms have also launched free classes that have prompted students to try their hands on digital education. With more students turning to online learning than ever, these platforms have emerged as a lucrative target for cybercriminals.

The NIST Cybersecurity Framework: 5 core functions and how to align with them using AD360

The Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce. This framework was created through collaboration between various private-sector and government experts to provide high-level taxonomy of cybersecurity outcomes and a methodology to assess and manage those outcomes.

Monitoring NGINX with Applications Manager

NGINX is open-source software that started out as a web server and now provides various solutions such as web serving, reverse proxying, caching, load balancing, media streaming, and more. It also serves as a proxy server for email (IMAP, POP3, and SMTP) and a reverse proxy and load balancer for HTTP, TCP, and UDP servers.

Get a live view of network performance with OpManager's Real-time Dashboard

Although network monitoring is an unenviable task, it must be done to sustain your network’s health. But what if you had a real-time report containing only key metrics, revealing how your network is doing without overloading you with information? This would (1) assure you that there are no aberrations in your network and (2) give you peace of mind.

We studied how the pandemic has affected ITSM - here are the results

As the world moves towards the “new normal” on account of the pandemic, numerous adjustments and recalibrations have been made in all aspects of our lives, including the organizations we are part of. As businesses base their operations on a dispersed workforce beyond the corporate perimeter, IT teams have been the ones largely enabling this successful migration to home workspaces and further sustaining the remote network to foster productivity.

Introducing the OpUtils mobile app

Troubleshoot your IP addresses and switch ports faster and smarter! Managing and troubleshooting your network IPs and ports effectively can become difficult if hands-on network monitoring by your IT team is required at all times. Ever wondered if you can monitor your IPs and endpoints on the go? If yes, the solution you need is the OpUtils mobile app.

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, and Elon Musk.

Five worthy reads: Remote workplaces: Is hybrid the way to go?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the merits of going hybrid in this era of distributed workforces and remote working culture. While it has become imperative for organizations to implement remote work policies, the question of cloud adoption has become almost unavoidable.