Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Can devs and designers get along? - Dev Matters S1E02

In this episode of Dev Matters, Don and his guest Ben Sanders discuss whether software developers and designers can really get along. Ben shares stories, tips, and strategies pulled from his experience of over 15 years in the software industry. This episode was recorded in front of a live studio audience on Twitch.

Splunk SOAR Playbooks: Azure New User Census

Hafnium is the latest cyberattack that utilizes a number of post-exploitation tools after gaining access to Exchange servers through a zero-day exploit. One of their persistence methods was creating new user accounts in the domain, giving them the ability to log back into the network using normal authentication rather than use a web shell or continue to re-exploit the vulnerability (which has since been patched). Learn how you can use Splunk Phantom to automate account monitoring to ensure that threat actors are not exploiting vulnerabilities to access sensitive information through authenticated accounts.

Resource check profile - Monitor Windows event logs and Linux syslogs

Track server resources such as Windows event logs and Linux syslogs to monitor specific events and strength your server's security. Internet-facing systems constantly confront the risk of security hacks and data theft. While you're monitoring key performance metrics of your servers, keeping an eye out for security incidents is also necessary. This can be achieved through event log monitoring for Windows servers, and syslog monitoring for Linux servers.

AppDynamics with Cisco Secure Application Demo

See how you can protect your business-critical applications with Cisco Secure Application. Built in collaboration with Cisco Security, Secure Application simplifies vulnerability management, blocks attacks in real-time, and creates a shared context for App and Security teams. Maximize uptime and performance while minimizing risk with Secure Application.