Operations | Monitoring | ITSM | DevOps | Cloud

Restore authority with Token Bandwidth Controls!

Now you can go beyond measuring your bandwidth usage and regain control via Cloudsmith's new bandwidth controls for Entitlement tokens. You can craft tokens with individual usage limits using the UI, API, and CLI, allowing you to decide the exact level of usage for each token. Combining the new and existing limits for entitlement tokens, allowances are configurable to provide fine-grained control for any combination of properties.

Email Security Risks: Why You Need a Cyber Security Plan

Even though technology has advanced significantly over the past few decades, hackers and cybercriminals still target large volumes of email messages daily. Some of the biggest types of things that get sent through email include malware, ransomware, trojans, and viruses. These things are often disguised in some sort of “friendly” email message, an embedded link, or a cute kitten meme.

InfluxDB 2.0 Release Candidate Now Available

Today we announce InfluxDB 2.0 Open Source’s first official release candidate (RC). This represents a final version of the software as we move towards general availability. We appreciate all the feedback from our users over the last few years and realize that getting to this stage has taken longer than any of us predicted.

System extensions are replacing macOS kernel extensions. How will this affect you?

From the outset, Apple has been keen to protect user privacy and security, and deprecating kernel extensions is one of the company’s latest moves towards modernizing its platform. As part of Apple’s sustained effort to make macOS a more reliable and secure platform, the tech giant announced at WWDC 2019 that kernel extensions are going to be replaced in macOS Catalina with Apple’s new technology, system extensions. But, why should you care? Let’s explore now.

Gain actionable insights with XHR-level detail for response codes

A broken or poor performing XHR can significantly impact a user’s experience with a page by slowing down the load time or causing it to break entirely. Many of our customers monitoring web applications agree that monitoring and optimizing XHR calls is the biggest lever they have to improve application performance. In April of this year, we announced that Raygun Real User Monitoring can now surface analytics into the response codes from XHR calls.

Monitor SSL TLS Certificate Expiration

Secure Socket Layer (SSL) and its successor, Transport Layer Security (TLS) are protocols designed to safeguard traffic over the internet. SSL certificates allow websites to move from HTTP to HTTPS, a more secure communication channel on a network. Starting this September, the lifespan of an SSL/TLS certificate will be limited to 398 days, a reduction from the previous maximum certificate lifetime of 825 days.