Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

True Stories of Devastating Data Loss (And Tips for Improving Your Own Backup Strategy)

Data loss can come from any number of sources, whether it’s a hurricane that causes major flooding in a server room or a bad actor threatening the safety of critical data by demanding a ransom for its safe return. If an organization only has a single copy of data on that waterlogged hard drive or in the hands of a cybercriminal, the odds of recovery are slim to none.

The Role of Physical Security in Safeguarding Sensitive Information in Data Centers

Physical security plays a vital role in safeguarding sensitive information housed within data centers. As data centers store vast amounts of confidential and mission-critical information, securing these facilities is essential to prevent unauthorized access, data breaches, and physical theft.

New Relic vs Splunk - In-depth Comparison [2024]

New Relic and Splunk are two prominent tools in the world of observability and monitoring, each serving distinct purposes. New Relic is used for Application Performance Monitoring (APM), offering a full-stack observability platform. It is important to note that New Relic is not a SIEM tool, its primary focus is performance monitoring. On the other hand, Splunk is used for log management, machine data analytics, and is widely utilized as a SIEM tool.

The Requirements for NIS2 Compliance: An Overview

The NIS2 Directive, an evolution of the original Network and Information Security Directive, aims to fortify cybersecurity across member states. Compliance with NIS2 not only helps organizations avoid regulatory penalties but also enhances their overall security posture, making them more resilient against cyber threats.

How will the Economic Crime and Corporate Transparency Act affect crypto investors?

While many businesses in the UK are caught up in speculating about what a new Labour government could mean for them, those in the crypto space should take care not to miss the biggest story that has arisen already this year. The Economic Crime and Corporate Transparency Act 2023 (ECCT) entered into force at the start of the year and brought with it a raft of new powers for law enforcement agencies and investigators. Among the primary aims of the legislation was to help tackle fraud and criminal financing involving cryptocurrencies and cryptoassets, but it may make it harder to protect your crypto wallet.

6 Ways to Protect Your API Against Attacks

When configured correctly, Application Programming Interfaces (APIs) enable seamless data exchanges across platforms, assisting with cross-app integrations and making microservices possible. As APIs have become integral in modern applications, we as developers must learn how to protect them against impending threats. The State of API Security report found that 74% of respondents have experienced at least three API-related breaches since 2021, so the threat here is very real.

Introducing Kosli's Logical Environments: Gain total visibility and control over complex systems

In today’s fast-paced development landscape, environments are no longer simple or isolated. You’re managing resources that span across development stages, geographies, and technologies. And as those environments grow more complex, so does the need for a more logical and efficient way to manage them.

Myth vs. Reality: Lessons in Reliability from the July 19 Outage

It was 3AM at Newark Liberty International Airport. I was groggy, waiting in line to get my boarding pass, only to be met with a blue screen on the check-in kiosk. Needing some coffee, I learned the vendor was only accepting cash. There was clearly a big outage and I quickly checked our systems at PagerDuty. Major outages happen multiple times per year, so frequently that we have an internal dashboard (colloquially referred to as “the internets are broken”).