Detect security threats with anomaly detection rules
The Bits AI Security Analyst automates the initial stages of Security Information and Event Management (SIEM) investigations, significantly reducing analyst workload. It uses AI to…
The Bits AI Security Analyst automates the initial stages of Security Information and Event Management (SIEM) investigations, significantly reducing analyst workload. It uses AI to…
This article advocates for enriching security logs with data from the ServiceNow Configuration Management Database (CMDB) *before* sending them to SIEM or logging tools. By adding …
Please provide me with the article content! I need the text of the "Improve performance and reliability with APM Recommendations" article to be able to summarize it for you. Just…
This FireHydrant update addresses several bugs to improve incident management. Specifically, it prevents duplicate Zoom bridges when using multiple runbooks and ensures long action…
08/16/21 There should always be opportunities to laud our peers’ achievements and good work. One of the things I’ve noticed (at least here in America) is we tend to speak up about …
08/16/21 The 2020 SolarWinds® IT Pro Day survey looked at the changing roles and responsibilities of IT pros throughout the pandemic. Overall, nearly two-thirds of surveyed IT pros…
08/13/21 Recently, my colleagues Pete Di Stefano, Ashley Adams, and I hosted a webcast on the topic of capacity planning and optimization. You can listen/watch it here, it was a re…
08/11/21 This past April, my husband and I took on our most exciting and daunting chapter yet: parenthood. Despite the chaos around us, we made the most of our pregnancy and thorou…
08/10/21 You can learn a lot about an organization by looking at their data. For example, if I see “LoanToValue” (LTV) or “CollateralValue,” I could surmise they deal with financia…
08/09/21 Last week, my friend and colleague Leon Adato (t | b) introduced 2021’s IT Pro Day theme “Bring IT On” and observed an IT pros’ life experiences helped to form the foundat…
These days we’re hearing more and more about ‘supply chain attacks’. That’s when a component of an application has a weakness with the potential to make the entire system or servic…
This article discusses using remote instrumentation to gain deeper insights into the performance and behavior of AWS Lambda functions without modifying application code. By leverag…