Operations | Monitoring | ITSM | DevOps | Cloud

Identity Guard: Identity Theft Protection Tool

Identity theft is on the rise and it is not enough to simply stay on top of the latest trends in this arena to avoid falling victim to common cons; you need to be proactive to prevent sensitive information being stolen and used against you. This is where Identity Guard’s identity theft protection tool comes into play. It aims to deliver always-on protection from the biggest threats faced by innocent web users.

Key Value Parser Delivers Useful Information Fast

Parsers make it easier to dig deep into your data to get every byte of useful information you need to support the business. They tell Graylog how to decode the log messages that come in from a source, which is anything in your infrastructure that generates log messages (e.g., a router, switch, web firewall, security device, Linux server, windows server, an application, telephone system and so on).

Blocking USB Drives For Work From Home Employees

With so many people working from home, the perimeter of corporate data safety has suddenly grown very large, in many cases encompassing employee home computers. Data loss prevention (DLP) was challenging enough already, but now it takes on even more importance. One way that data can escape the corporate network is by getting copied to USB thumb drives. Some companies take the approach of gluing or epoxying the USB ports closed.

What Is User Activity Monitoring? Learn the What, Why, and How

What do you think is the most important aspect of a company? Performance? Perhaps you’re thinking of profits. True, performance and profits are crucial. But security tops the list. Every company caters to different users regularly. But does the necessity of security change whether the user base is narrow or wide? Users have access to a lot of information, and often, this leads to the risk of unauthorized access and data breach.

ServiceNow partners lean into emergency response

In response to the COVID-19 crisis, ServiceNow invited our global partner ecosystem to join us in supporting customers across the world who chose to implement our four no-charge emergency response apps. We also invited partners and customers to develop their own COVID applications on the Now Platform®.

Hunting COVID Themed Attacks With IOCs

This blog post is part twenty-four of the "Hunting with Splunk: The Basics" series. I've been dealing with viruses for years, but this is the first time I've written a blog post where we are dealing with actual viruses. Ever since the 2004 tsunami, I have witnessed cyber-baddies using current events to trick users into opening documents or clicking on links. The COVID-19 breakout is no different.

Sponsored Post

Unlock next-level detail in Real User Monitoring with these latest improvements

In our latest release, we're rolling out a whole series of improvements to Raygun Real User Monitoring that gives you the instance-level data you need to understand exactly how your application is performing in every single user session. Armed with this level of diagnostic information, you and your team will know exactly where to spend time when improving the performance of a particular page.

Monitor ECS applications on AWS Fargate with Datadog

AWS Fargate allows you to run applications in Amazon Elastic Container Service without having to manage the underlying infrastructure. With Fargate, you can define containerized tasks, specify the CPU and memory requirements, and launch your applications without spinning up EC2 instances or manually managing a cluster. Datadog has proudly supported Fargate since its launch, and we have continued to collaborate with AWS on best practices for managing serverless container tasks.