Operations | Monitoring | ITSM | DevOps | Cloud

SolarWinds

Common API Vulnerabilities and How to Secure Them

Application programming interfaces (APIs) have become a critical part of almost every business. APIs are responsible for transferring information between systems within a company or to external companies. For example, when you log in to a website like Google or Facebook, an API processes your login credentials to verify they are correct.

SolarWinds Named Supplier on the Crown Commercial Service's G-Cloud 13 Framework

If you watched our recent SolarWinds Day: Secure by Design panel discussion, you know security is a critical need for all businesses today. Secure by Design is our guiding principle for how we built our security approach, adhering to government regulations and industry expectations.

4 Node.js Logging libraries which make sophisticated logging simpler

Node.js logging, like any form of software instrumentation, isn’t an easy thing to get right. It takes time, effort, and a willingness to continue to iterate until a proper balance is struck. There are so many points to consider, including: Previously, here on the Loggly blog, I began exploring these questions in the context of three of the most popular web development languages: PHP, Python, and Ruby. But these aren’t the only popular languages in use today.

Why Cybersecurity Is Important: Safeguarding Data in an Evolving World

Our hybrid world is rapidly growing and changing due to emerging technologies like artificial intelligence (AI), machine learning (ML), robotics, quantum computing, and cloud services. While these advancements bring many advantages, they’ve also made digital systems more complex, increased cost, and introduced new cybersecurity challenges.

SolarWinds Day: Secure By Design (6/28/23)

Join us for this SolarWinds Day: Secure by Design virtual event as we explore the importance of public/private partnerships to secure our common cyberinfrastructure. Hosted by SolarWinds CISO and VP of Security Tim Brown, this event includes a bipartisan panel of government leaders discussing the United States National Cybersecurity Strategy, its related frameworks, and the nature of today’s cyber risks.

Micro-Outages Uncovered: Exploring the Real Cost of Downtime for Your Business

Unplanned downtime is an eventuality every business tries to avoid but will face. In today’s digitally interconnected world, outages can be particularly damaging, especially if the business is unprepared. Not only can outages cause employee frustration and anger customers, leading to numerous intangible costs like lower satisfaction hurting a company’s reputation, but the loss of employee productivity caused by unplanned downtime can significantly affect the bottom line.

Why ChatOps Integration Is What Your ITSM Needs

In recent years, teams have drastically changed how they communicate and collaborate. With the rise of physical distancing and remote work, many businesses have found email slow and burdensome. Instead, they use chat clients like Microsoft Teams or Slack to effortlessly share information and solve problems without needing more online calls.

OpenTelemetry Security: How To Keep Telemetry Data Safe

Organizations implementing observability in their digital services architecture should be familiar with OpenTelemetry (OTEL) framework. While our OTEL guide provides an in-depth examination of the benefits of this open-source framework, the potential security challenges with OpenTelemetry warrant a separate guide.