Software is a complex thing. As soon as you deploy an application to production—especially when you don’t have any control over the environment it’s running on—anything could happen. You’ve created this “monster” and set if free. It’s now free from your control. How do you tame this beast before it creates havoc? The first step is to trace its steps (no pun intended).
While Blockchain technology offers unprecedented security solution and information sharing solution, it remained as of now mostly limited to the cryptocurrencies. While cryptocurrencies made Blockchain their core technology strength, other industries remained mostly silent bystanders.
We're excited to announce that we've shipped some nice improvements to our broken links & mixed content checks. These checks both make use of the crawler that powers those features. When we first launched Oh Dear!, we decided to limit the crawls to the first 1.000 unique pages we find. This was mostly a protection for infinite loops, since those are really hard to detect.
Developer teams and even operational teams often ignore monitoring applications. Deadlines, inexperience, company culture, and management can lead to poor or neglected monitoring inside developing platforms. Automating all monitoring tasks is an excellent way to avoid this scenario. Automation leads to lower costs, less time spent solving issues, and more efficient teams.
Cortex, the open source, horizontally-scalable, highly-available, clustered Prometheus implementation that powers Grafana Cloud’s Hosted Prometheus cut its first release yesterday! This release was led by Chris Marchbanks from Splunk, who put together the whole release process and shepherded this first release.
Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to their use, or rather misuse, of legitimate credentials, machines, and access privileges. Traditional SIEM solutions use simple rule-based alerting to detect potential insider threats, which cannot analyze user behavior or detect any anomalies therein.
Read the latest news on Magecart attacks! We’ve trawled the web for the latest news of data breaches, including updates on previous attacks with insights from our own Security Researcher.