Operations | Monitoring | ITSM | DevOps | Cloud

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks. Often, they disguise malicious operations by mimicking the activities of legitimate users, leaving behind little to no footprint. Blending malicious actions with day-to-day IT activities helps attackers maintain a low profile and remain undetected for a longer period.

Monitor Azure IoT Edge with Datadog

Azure IoT Edge is a Microsoft Azure service that allows you to run containerized workloads on IoT devices. With IoT Edge and Azure IoT Hub, Azure’s device-management platform, organizations across science, manufacturing, energy production, and other industries can provision their IoT devices and workloads at the edge of their cloud networks for immediate in-unit computing, a necessity when running AI algorithms or parsing large datasets directly on IoT devices.

7 Practical Problem Management Techniques to Improve Your Service Delivery

All IT support teams know that problem management is used to identify the root causes which help to permanently resolve recurring incidents and follows specific steps like: However, problem management still remains an underrated, underutilized process which is mostly used together with incident or change management process. Problem management, out of all the ITSM processes has one of the lowest adoption rates.

Taming the compliance beast: achieve efficiency & reliability at scale

Regulatory compliance is time-consuming and expensive. A recent survey of IT security professionals found that, on average, organizations must comply with 13 different regulations and spend an average of $3.5M annually on compliance activities, with audit-related activities consuming 232 person hours per year. With a team of five people, that adds up to 1.5 months a year devoted to audit-related activity. That’s a lot of hours that could have been spent on initiatives driving customer value.

Barriers to DevSecOps Adoption

DevSecOps — or the merging of Ops and Security — has been at the center of discussion for the better part of the outgoing decade. Today, the complexity of infrastructure change, demands security and DevOps teams to work together more efficiently. But there are hurdles to adoption of DevSecOps as a methodology. Cloud-native applications often live in multiple clouds across data centers, co-location, and public clouds.

Download PowerBI Diagram for visualizing overrides using Sankey

Did you catch our recent webinar on how PowerBI makes it possible to visualize override sprawl in SCOM with Sankey Diagrams and want to give our Sankey diagrams a go yourself? You are in the right place. Before you dive in, take a look at our blog explaining the “why” to using Sankey PowerBI diagrams to see your overrides, and how to take action based on what you see here.

6 tips for improving your Grafana plugin before you publish

Are you putting the final touches on your plugin before you submit it to the Grafana plugin page? In this article, I’ll share a few tips for how to add that extra polish to your plugins. This article assumes that you already have some knowledge of building plugins for Grafana. If you’re looking to build your first plugin, start by following one of our plugin tutorials.