Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had to be put into devising a plan for the careful execution of attacks, and advanced technical knowledge of domains and networks was a requisite. Over time, with the advent of open-source pen testing tools, the knowledge gap and the complexities involved to carry out a full-scale cyberattack have narrowed drastically.

How to monitor istiod

Istio is a service mesh that enables teams to manage traffic in distributed workloads without modifying the workloads themselves, making it easier to implement load balancing, canarying, circuit breakers, and other design choices. Versions of Istio prior to 1.5 adopted a microservices architecture and deployed each Istio component as an independently scalable Kubernetes pod. Version 1.5 signalled a change in course, moving all of its components into a single binary, istiod.

New Microsoft partnership embeds Datadog natively in the Azure portal

We are excited to announce a new partnership with Microsoft Azure, which has enabled us to build streamlined experiences for purchasing, configuring, and managing Datadog directly inside the Azure portal. This first-of-its-kind integration of a third-party service into a public cloud provider reduces the learning curve for using Datadog to monitor the health and performance of your applications in Azure—and sets you up for a successful cloud migration or modernization.

System extensions are replacing macOS kernel extensions. How will this affect you?

From the outset, Apple has been keen to protect user privacy and security, and deprecating kernel extensions is one of the company’s latest moves towards modernizing its platform. As part of Apple’s sustained effort to make macOS a more reliable and secure platform, the tech giant announced at WWDC 2019 that kernel extensions are going to be replaced in macOS Catalina with Apple’s new technology, system extensions. But, why should you care? Let’s explore now.

Gain actionable insights with XHR-level detail for response codes

A broken or poor performing XHR can significantly impact a user’s experience with a page by slowing down the load time or causing it to break entirely. Many of our customers monitoring web applications agree that monitoring and optimizing XHR calls is the biggest lever they have to improve application performance. In April of this year, we announced that Raygun Real User Monitoring can now surface analytics into the response codes from XHR calls.

Monitor SSL TLS Certificate Expiration

Secure Socket Layer (SSL) and its successor, Transport Layer Security (TLS) are protocols designed to safeguard traffic over the internet. SSL certificates allow websites to move from HTTP to HTTPS, a more secure communication channel on a network. Starting this September, the lifespan of an SSL/TLS certificate will be limited to 398 days, a reduction from the previous maximum certificate lifetime of 825 days.

Best Practices for Delivering a Business-Driven Security Posture

The main focus for cybersecurity teams — moving beyond compliance — is to deliver the level of security required to manage the likelihood of a breach and the potential impact to the business. This is more effective than simply focusing on the cost of delivering security services.

AWS threat detection using CloudTrail and Sysdig Secure

Implementing AWS threat detection with Sysdig Secure takes just a few minutes. Discover how to improve the security of your cloud infrastructure using AWS CloudTrail and Sysdig Cloud Connector. With the rise of microservices and DevOps practices, a new level of dangerous actors threatens the cloud environment that governs all of your infrastructure. A malicious or inattentive cloud API request could have a sizable impact on availability, performance, and last but not least, billing.

Incident Review - Microsoft Office 365 Outage

The whole internet spins across different domains but when we talk about the backbone suite of every organization, MS Office 365, is for sure, one of the biggest contenders. Just like the recent Century Link/Lumen outage, we witnessed another major outage, this time Microsoft O365. This month might as well be considered a bad month for the internet, as we have seen a lot of daily used consumer services getting impacted like Reddit, Pinterest, Google Services, etc.

Backing SCCM With Smart IT Experience Automations

Like many in IT, I am a big fan of Microsoft System Center Configuration Manager (SCCM). It’s one of those tools that you can’t really go without: it can help locate your company’s servers, desktops and mobile devices; it helps install client software, patch updates (see Microsoft Patch Tuesday); and it protects your endpoints and access control tools. All good things, but… Sometimes our beloved SCCM needs a little backup—like Robin to Batman.