At Honeybadger, we use Redis a lot. It's our Swiss Army Knife; it's a cache, a single source of truth, it stores background jobs, and more. Basically, Redis is one of those services that should never fail. I was pondering the DevOps apocalypse recently, as one does (could Redis be one of the four horsemen?), which led me to jump into our #ops channel to ask Ben a simple question: what are the risks if someone executed flushall on our redis instances?
Identities are easy to fake, but not actions. Closely monitoring the behavior of a person can reveal a lot about their true intentions. Similarly, keeping a close watch on a machine’s activities can expose potential security problems. Blending security information and event management (SIEM) with user and entity behavior analytics (UEBA) can bring numerous users and devices belonging to an enterprise under surveillance.
It’s not the first time I’ve been asked by a sales rep the following question: “The customer has looked at Stackalytics and is wondering why Rancher doesn’t have as many code commits as the competition. What do I say?” For those of you unfamiliar with Stackalytics, it provides an activity snapshot, a developer selfie if you will, of commits and lines of code changed in different open source projects.
We’re excited to announce the launch of our new product to the ManageEngine family, Device Control Plus — the Data loss prevention (DLP) solution you need to control removable devices at any stage.