Category: News
Three Myths About Big Data and APM
In my last blog, I focused on how a big data approach can be applied to application performance monitoring (APM) to accelerate mean time to repair. Unlike data sampling or use of triggers, a big data approach to APM ensures that all the data isModular cryptojackers now deliver illicit cryptomining to cover multiple platforms at once
Skip to main content Cryptojacking attacks are not going away any time soon. Instead, they’re becoming more sophisticated – and more dangerous – by using advanced modular malware with worm capabilities as a delivery mechanism. A complexIntroduction to Reverse Engineering Cocoa Applications
While not as common as Windows malware, there has been a steady stream of malware discovered over the years that runs on the OS X operating system, now rebranded as macOS. February saw three particularly interesting publications on the topic ofCloud app security in a direct-to-cloud world
An increasing number of organizations are embarking on the ‘direct-to-cloud’ journey. This provides a number of benefits from a performance, operations and cost standpoint due to the efficiencies achieved by remote and branch locations routingWatch the full RISK conference 2019 recap video
RISK conference 2019, which took place in Lasko, Slovenia, on March 19th and 20th, was our largest event to date – with over 600 participants from 25 countries in attendance. […]Partner Perspectives: Maintaining Order in Chaotic Times
Erkang Zheng is the CISO of LifeOmic and the General Manager of JupiterOne. One of the key challenges facing growing cloud-native organizations is the ability to maintain your security and compliance posture despite your employees’ access toSOAR vs. Security Operations: What’s Really Going On?
SOAR vs. Security Operations: What’s Really Going On? POSTED BY JOHN CZUPAK There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful5 Most Common Application Performance Issues
Some things never change: application performance issues Flashback to twelve years ago when I was working at Mercury Interactive on their managed service for application performance management (APM). That year, Italy won the World Cup (again)Network Packet Broker Rules and Configurations
The Port Mirroring or SPAN (Switched Port Analyzer) method of monitoring network traffic has been the perennial focus of network visibility. With port mirroring enabled, the switch sends a copy of all network packets seen on one port (or anThreatQ Webinar: Leveraging Threat Intelligence for effective Vulnerability Management
November 14, 2019 at 10AM GMT Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to data breach. However, it is simply […]Load More