Operations | Monitoring | ITSM | DevOps | Cloud

Machine learning in cybersecurity: Detecting DGA activity in network data

In Part 1 of this blog series, we took a look at how we could use Elastic Stack machine learning to train a supervised classification model to detect malicious domains. In this second part, we will see how we can use the model we trained to enrich network data with classifications at ingest time. This will be useful for anyone who wants to detect potential DGA activity in their packetbeat data.

Distributed Tracing & Logging - Better Together

Monitoring requires a multi-faceted approach if DevOps teams want end-to-end visibility and deep insight into issues. This is especially true in the case of modern microservices applications, which are essentially collections of distributed services that talk to each other over a service mesh. With monolithic applications, requests can be tracked easily from the client to the server and back, but with modern applications, every request passes through numerous services before completion.

Monitoring 101: Collecting the Right Data

When it comes to business, data is everything. Whether it’s sales, supply, marketing, or your I.T. systems, every day is a constant stream of decisions to be made. To make the right decisions, you need enough knowledge. To have enough knowledge, you need the right data. What’s the best way to collect all this data? In the information age, there’s so much data out there, all the time.

Data Culture: The Future of the Intelligent Organisation Starts Here

In today’s digital world, every transaction is logged to give businesses endless amounts of functional data, and there is near-universal agreement that data insights will be integral to the success of businesses in the future. There is undoubtedly a need for a more data literate workforce.

Real User Monitoring vs. APM: What's the difference?

As modern development practices evolve at rapid rates we must stay focused on what makes for a great experience; fast, flawless software. In the pursuit of building fast, performant software, you’ve likely come across performance monitoring products like Real User Monitoring (RUM) and Application Performance Monitoring (APM). In this article, we go deeper into how using RUM and APM can help you and your team build better software experiences.

Telecommunications giant reveals an Active Directory server breach. What can we learn from it?

We’ve always been vocal about the imminent threat of breaches and propagated the message that irrespective of the size of your business, the industry you’re in, or your geography, you can be subject to a security breach. And unfortunately, history repeats itself often. On May 11, 2020, Nippon Telegraph & Telephone (NTT), a large telecommunications company, revealed that attackers may have stolen data from its internal systems, affecting over 600 customers.

SolarWinds Gives IT Pros New Levels of Hybrid IT Support With Enhanced IT Operations Management Portfolio

Introduces new and improved software-defined solutions support, AWS and Azure workload troubleshooting and visibility, and full-stack application and infrastructure monitoring capabilities

How AppSignal Monitors Their Own Kafka Brokers

Today, we dip our toes into collecting custom metrics with a standalone agent. We’ll be taking our own Kafka brokers and using the StatsD protocol to get the metrics into AppSignal. This post is for those with some experience in using monitoring tools, and who want to take monitoring to every corner of their architecture, or want to add their own metrics to their monitoring setup.