Blog

datadog

Introducing Metrics from Logs and Log Rehydration

As your application grows in size and complexity, it becomes increasingly difficult to manage the number of logs it generates and the cost of ingesting, processing, and analyzing them. Organizations often have little control over fluctuations in the volume of logs generated—and the resulting costs of collecting them—so they are forced to limit the number of logs generated by their applications, or to pre-filter logs before sending them to their log management platform.

datadog

Introducing Datadog Network Performance Monitoring

Network Performance Monitoring is currently available in private beta. Request access here. Your applications and infrastructure components rely on one another in an increasingly complex fabric, regardless of whether you run a monolithic application or microservices, and whether you deploy to cloud infrastructure, private data centers, or both.

datadog

Dash 2019: Guide to Datadog's newest announcements

At Dash 2019, we are excited to share a number of new products and features on the Datadog platform. With the addition of Network Performance Monitoring, Real User Monitoring, support for collecting browser logs, and single-pane-of-glass visibility for serverless environments, Datadog now provides even broader coverage of the modern application stack, from frontend to backend.

protego

A Deep Dive Into Serverless Attacks. SLS-6: Security Misconfiguration

In traditional applications, security misconfiguration can happen at any level of an application stack, including network services, platform, web server, application server, database, frameworks, custom code, and preinstalled virtual machines, containers, or storage. Luckily, almost none of that has anything to do with serverless. The network services, platform, database, frameworks, VMs all of that belongs to the cloud provider. Containers? We’re passed that. Servers? What are those?

katalon

From DevOops to DevOps | Best Strategies to Implement for Your Team

In today’s rapidly changing world, software products need to be upgraded frequently and quickly to bring value to customers and users. Software features are continuously developed, tested, deployed, and operated in the production environment. New features are not only developed and tested successfully, but they also deployed and operated without much chaos and disruption.

websitepulse

Poor Web Hosting and Maintenance Leads to Hacking

Many individuals feel accomplished after owning a business website; so much so that they even forget to set up security defenses around it. On the other hand, most of the people deliberately skip this step because why would hackers hack small-scale business models, right? You would be surprised to learn that 43% of hackers target small businesses. Besides, 60% of small-scale companies go out of business within six months of a cyberattack.

bitrise

Weekly Community Roundup: July 10 - 17

Welcome back to another Community Roundup, everyone! It's safe to say we had one hell of a week: not only did we launch our brand-new Writers’ Program to support all the Bitrise enthusiasts out there who regularly write articles and guides about the platform and its usage, we also saw some great new pieces and tweets going on in the community. Let’s dig in, shall we?
alienvault

Newly identified StrongPity operations

Alien Labs has identified an unreported and ongoing malware campaign, which we attribute with high confidence to the adversary publicly reported as “StrongPity”. Based on compilation times, infrastructure, and public distribution of samples - we assess the campaign operated from the second half of 2018 into today (July 2019). This post details new malware and new infrastructure which is used to control compromised machines.