Increased Test Credits for Everyone

After learning more about how our users use test credits to diagnose and troubleshoot network issues, we realized that we needed to make credits more affordable so we significantly increased the number of credits included with each credit package. See the new options below. We hope this change allows you to continue running cost effective network tests.

Top 5 Open-Source HIDS Systems

The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot. A single unauthorized access led to the theft of 500M personal identifiable pieces of information.


Reporting Up: Recommendations for Log Analysis

What kind of log information should be reported up the chain? At a certain point during log examination analysts start to ask, “What information is important enough to share with my supervisor?” This post covers useful categories of information to monitor and report that indicate potential security issues. And remember: reporting up doesn’t mean going directly to senior management. Most issues can be reported directly to an immediate supervisor.


SIEM: The Steps Before "The First Steps"

We do a lot of work creating, describing and publishing security use cases to empower SIEM programmes - like a recent webinar with (ISC)2 on ‘20 SIEM Use Cases in 40 Minutes: Which Ones Have you Mastered?’ or sharing stories like Telia’s journey to tackle cybersecurity challenges. However, I thought it would be beneficial to step back from the ‘SIEM minutiae’ to take a better look at IT security strategy and governance.


AWS ECU vs vCPU—Everything You Need to Know

If you’ve deployed an application or service to the Amazon Web Service (AWS) cloud, you’ve probably made use of an EC2 instance. One of the decisions that you had to make before you could start a new instance, was which instance type to use. Choosing an EC2 instance type can be a complicated process. AWS organizes their instance types into instance families, and within an instance family, there are varying sizes from micro to 32xlarge.

Best ways to map impact of application performance issues on business goals

It is no secret that right application performance monitoring strategy is the key to ensure that your business delivers steady performance 24/7. To get the best from your applications and ensure smooth end user experience, it is critical to identify where the pitfalls lie and be cognizant to all the end-to-end processes involved in your business applications.

23 AI Strategies for Making Your Life in IT Suck Less - Part 1

Unless you’re truly a tech newbie, you’ve probably heard some kind of hype around artificial intelligence—often referred to as AI—machine learning, predictive analytics or a whole host of other words, terms and phrases, all pointing toward a similar conclusion: Emerging technology can do some pretty amazing things for people, teams and entire organizations.