Many engineering organizations embrace the DevOps philosophy as a strategy for speeding software development and delivery while simultaneously ..
Security and IT teams may be loath to admit it, but security has historically been mostly a reactive affair. Security engineers monitored ..
Threat hunting is emerging as a must-have addition to cybersecurity strategies. By enabling organizations to find and mitigate threats before ..
In the beginning, there was the Log – or to be a bit more precise, there were application logs. At least that’s how it was in the early ..
Over the past decade, the way we build and deploy applications has changed dramatically. The explosion of public cloud providers enables ..
Application monitoring is a well-established discipline that dates back decades and remains a pillar of software management strategies today. ..
It’s one thing to detect a cyber attack. It’s another to know what the attackers are trying to do, which tactics they are using, ..
Telegraf is a server-based agent for collecting all kinds of metrics for further processing. It’s a piece of software that you can install ..
It’s essential to choose the right tool for the job. I have an old, sturdy screwdriver that I use for lots of odd DIY jobs around my house, ..