Operations | Monitoring | ITSM | DevOps | Cloud

Threat Hunting Explained: See It in Action, Learn How It Works

Most IT and security professionals have heard of threat hunting – but few have seen it in action or fully understand how it works in the real world. That’s about to change. In this on demand webinar, Jim Waggoner and Kevin O’Connor guide you through a hands-on threat hunting session, showing how they identify, investigate, and surface hidden threats across cloud and endpoint environments. You’ll learn.

Inside Our Security Masterclasses: Practical Insights for Cyber Resilience and Identity Protection

Explore an overview of our Security Masterclass series led by Stefanie Hammond, designed to help MSPs and IT professionals understand today’s evolving cyber threats and how to address them effectively. This video highlights two key sessions: Ideal for teams looking to deepen their cybersecurity knowledge or organizations aiming to enhance their security offerings with clear, practical guidance.

Unleashing Protective DNS: The First Line of Cyber Defense You're Still Underestimating

Many cyber threats - like phishing, ransomware, and shadow IT - start at the domain layer. But too many security stacks only respond once the damage is done. In this on-demand webinar, Mikey Pruitt, Partner Evangelist at DNSFilter, shares insights, practical examples, and a live demo to show why DNS-layer protection is no longer optional - especially for MSPs and IT teams. Watch as Mikey breaks down.

Will AI Speed Development in Your Legacy App?

Some people can get an AI assistant to write a day’s worth of useful code in ten minutes. Others among us can only watch it crank out hundreds of lines of crap that never works. What’s the difference? There are some skills specific to AI development. There are also properties of the codebase we’re working in that make it amenable to AI assistance. Most AI demos use projects created from scratch with AI in mind—cute.

From Sequential Bottlenecks to Concurrent Performance: Optimizing Log Processing at Scale

We optimized log processing pipeline by moving from sequential to concurrent processing at the entry level, achieving 30% higher throughput and better resource utilization without increasing infrastructure costs. When customers start sending millions of logs per minute, you quickly discover whether your processing pipeline can actually scale with vertical scaling.

VirtualMetric Earns ISO 27001:2022 Certification: Security at Every Level

We’re excited to share that VirtualMetric has officially achieved ISO 27001:2022 certification, a globally recognized standard for building and managing an effective Information Security Management System (ISMS). This confirms that we’ve implemented robust controls to protect data, manage risks, and ensure the resilience of our infrastructure in today’s security landscape.

VirtualMetric in the 2025 Comprehensive Market Guide: Rising Data Pipeline Security

Over the past year, much of cybersecurity’s attention has centered on the promise of AI-powered SOCs. But as the Market Guide 2025 by Francis Odum reveals, the true foundation of modern security success lies in the data layer. “Without clean, well-routed telemetry, even the smartest AI is starved of context,” points out the researcher. And that’s where Security Data Pipeline Platforms (SDPPs) have become essential.

VirtualMetric Achieves SOC 2 Certification: A Milestone in Trust and Security

We’re excited to announce that VirtualMetric has achieved SOC 2 Type 2 certification. This is a key step in our mission to deliver secure, resilient, and efficient telemetry solutions. This certification confirms that our controls for security, availability, confidentiality, and data integrity don’t just look good on paper — they work in practice, over time.

How to Set Up Real User Monitoring

Synthetic monitoring provides consistent, repeatable results, 2.1s load times, passing Lighthouse scores, and minimal variability. But those numbers reflect lab conditions. On slower networks, like 3G in Southeast Asia, real users may see much higher load times, 5.8s or more. This isn’t a fault of the tools. It’s a difference in testing context. Synthetic tests run on fast machines, stable connections, and clean environments.

Monitor Nginx with OpenTelemetry Tracing

At 3:47 AM, your NGINX logs show a 500 error. Around the same time, your APM flags a spike in API latency. But what's the root cause, and why is it so hard to correlate logs, traces, and metrics? When API response times cross 3 seconds, identifying whether the slowdown is at the NGINX layer, the application, or the database shouldn't require guesswork. That's where OpenTelemetry instrumentation for NGINX becomes essential.