Security Monitoring – It’s All About the Data
09/11/18 In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your net…
09/11/18 In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your net…
09/10/18 It’s similar to the thought parents think about their kids: “Where has the time gone?” followed by a rush of memories, each one distinct and unique, carrying their own par…
09/07/18 Have you ever read about TV ratings? Almost every person that watches TV has heard of the ratings produced by the Nielsen Media Research group. These statistics shape how …
09/06/18 Key performance indicators (KPI) are values that every business can measure and track – values that show the effectiveness of your performance as an organization toward yo…
09/06/18 In part one of this series, we discussed the different types of databases available on the market today. In part two, we discussed how to choose the right database for you…
09/06/18 In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this p…
This article details how Netflix transitioned from relying on unlabeled data and anomaly detection to a supervised learning approach for identifying faulty deployments. Initially, …
09/05/18 What do The Guru, The Expert, The Maven, The Trailblazer, The Leading Light, The Practice Leader, The Heavyweight, The Opinion Shaper, and The Influencer all have in commo…
This article discusses how to gain better observability into AWS Lambda functions using remote instrumentation—essentially, collecting data *outside* the function itself. By levera…
08/31/18 The advantages of capacity management are plentiful. Simply put, IT capacity management is an ideal arrived at through the construction of a set of processes and monitorin…
08/31/18 The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering…
08/30/18 As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not generate furthe…