Threat Hunting with Cloud SIEM

Threat hunting is emerging as a must-have addition to cybersecurity strategies. By enabling organizations to find and mitigate threats before ..

1 year ago
0
575

How to Monitor Application Logs

In the beginning, there was the Log – or to be a bit more precise, there were application logs. At least that’s how it was in the early ..

1 year ago
0
442

What Is Threat Intelligence?

It’s one thing to detect a cyber attack. It’s another to know what the attackers are trying to do, which tactics they are using, ..

1 year ago
0
632

Microservices vs. Serverless Architecture

Microservices and serverless are both important topics in the world of cloud-native computing. Yet, although serverless functions and microservices ..

1 year ago
0
346

Log Analysis on the Microsoft Cloud

The Microsoft Cloud, also known as Microsoft Azure, is a comprehensive collection of cloud services available for developers and IT professionals ..

3 years ago
0
1318

Top 5 Metrics to Monitor in IIS Logs

When using and troubleshooting IIS web server performance, logs are an essential resource. Let’s look at the top metrics on IIS logs and how to get the most ..

4 years ago
0
1303
devsecops 2.0

DevSecOps 2.0

You’re doing DevSecOps, and that’s a good thing. But have you taken it to the next level yet? Are you doing DevSecOps 2.0? In this post, ..

4 years ago
0
1140