Operations | Monitoring | ITSM | DevOps | Cloud

How to quickly find unused metrics and get more value from Grafana Cloud

As the complexity of software systems explodes, so does the amount of data that gets generated by instrumenting these systems. This poses a problem for our users — especially those who are in charge of observability teams and observability platforms at large enterprises. They have to strike the right balance between cost management and giving teams the freedom to instrument whatever they want. Often observability leaders are supporting dozens of teams that are using hundreds of dashboards.

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

Announcing WP Activity Log Integration

With over 40% of websites powered by WordPress, there’s a good chance you or someone in your company is using it to update content or manage websites. This is why we’re excited to announce an integration with WP Activity Log—a comprehensive WordPress activity log plug-in—and SolarWinds® Papertrail™.

SouthStar Bank Fixes IT Issues Before Anyone Notices

I recently had the pleasure to talk with Jesse Miller from SouthStar Bank about some amazing IT results they were delivering. Southstar Bank, headquartered in Moulton, Texas — about midway between San Antonio and Houston — is a community bank specializing in residential mortgage, real estate and construction lending, operating 15 full-service branches in rural and urban communities across the Central Texas region.

End-to-End Monitoring of Citrix Infrastructures: FAQs

The webinar included a live demonstration of how our eG Enterprise solution provides an end-to-end view of the Citrix deployment including the Citrix ADCs, Delivery Controllers, License servers, Virtual App servers, Virtual Desktops, and other Citrix tiers including WEM, AppLayering, and others. Citrix Cloud is also supported.

Fashionably Late: The Zero Trust Trend is Here to Stay

I have often joked that IT, and in particular cybersecurity, is like fashion — not a lot is ever new, just reimagined and, in some cases, improved. As I sit pondering the beauty of my COVID-19 comb-over mullet, I have found myself thinking about how this fashion analogy applies to zero trust.

I Pity the Spool: Detecting PrintNightmare CVE-2021-34527

On Monday, June 21st, Microsoft updated a previously reported vulnerability (CVE-2021-1675) to increase its severity from Low to Critical and its impact to Remote Code Execution. On Tuesday, June 29th, a security researcher posted a working proof-of-concept named PrintNightmare that affects virtually all versions of Windows systems. Yesterday, July 1, Microsoft assigned this flaw a new CVE, CVE-2021-34527.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.

Proactive IT 101: Learn How to Build a Proactive Service Desk

What’s the service desk ticket that finally broke the camel’s back? Andrew Cohen (Sr. Manager, Digital Workplace Services at Cox) never had to find out – because he transitioned to a proactive service desk. In other words: a service desk that isn’t weighed down by growing ticket counts, reoccurring issues, and non-responsive employees. In a recent BrightTALK-hosted webinar, Andrew shared some of his firsthand experiences with building a proactive IT team.