Blogs
Home > Blogs
HermeticWiper Malware: How to Protect Against | The Impact on Ukraine & Others
Just before the invasion of Ukraine by Russian forces on February 24th, various cybersecurity companies revealed that a data wiper attack known as HermeticWiper was used against a number of Ukrainian organizations. Let's Understanding the Impact and How to Protect Against the Threat.
Stay Secure in a Multi-Cloud Environment
Security is top of mind in today’s evolving business landscape. Companies require the scalability and flexibility that a multi-cloud environment offers but securing it demands the same amount of focus. While this digital transformation trend will surely continue, what challenges may companies face and what are some ways we can work to mitigate? In this article, we’ll explore different approaches and how to stay secure in a multi-cloud environment.
Public Cloud Shared Responsibility Model: Things to Know
A shared responsibility model is a cloud security structure that governs the security oversight of a cloud infrastructure and its components and dictates accountability to the vendor or customer and its users. But as companies move to Public Cloud Solutions, the security model changes and defining who is accountable for which component of the infrastructure can be complicated. Where does the vendor’s security responsibility stop and where does the customer’s obligations begin? Let's find out in this article.
Top 5 Trends in Data Analytics in 2022
Data drives business decisions small and large, companies that are aware of industry trends can better innovate and be ahead of the curve. In this article, we’ll cover what Data Analytic Trends in 5 Key Areas we’ve seen gaining traction and we’d expect continued growth and industry adoption you may benefit from.
Observability vs. Monitoring: A Quick Guide
Observability and monitoring defined in the simplest terms can be viewed as, monitoring is to tell you when something goes wrong in your system, and observability is to help you understand why. Despite the distinctions between these definitions, the underlying goal of both is to achieve better visibility into systems. In this article we’ll explore the differences and how both work together.
Introduction to PowerBI Custom Visual Development
Introduction to PowerBI Custom Visual Development Careers Home Blogs Introduction to PowerBI Custom Visual Development PowerBI is a data visualization and data analytics service from Microsoft. You can easily create dashboards and reports with interactive
Log4j Vulnerability
NIST has announced a zero-day global vulnerability (CVE-2021-44228) in the Apache Log4j logging library. The Apache Log4j utility is a popular and commonly used component for logging services.
Google Chronicle Security - Threat Detection & Hunting
Chronicle Security is a cloud service, which is built as a specialized layer on the top of the Google infrastructure, designed for organizations to privately retain, analyze, and search the massive amounts of security and network logs or data they generate.
Crest Data joins the Datadog Marketplace
Crest Data joins the Datadog Marketplace Home Blogs Crest Data joins the Datadog Marketplace NEW YORK — Crest Data, a market leader in building Analytics, Security and DevOps integrations, announced today a
Visual Regression Testing with WebdriverIO
Visual regression testing is the process of validating visual elements of an application or website to ensure that code modifications do not introduce any unexpected issues. It prevents the user interface bugs raised due to adding the new features to your application. It speed-up the development process and it is always good to automate it!
Introduction to Cypress Automation Testing
Introduction to Cypress Automation Testing: A Comparison of Testing Types “A good programmer is someone who always looks both ways before crossing a one-way street” – Doug Linder.
Remediate Security Vulnerabilities in npm/Yarn dependencies
Two of the most popular package managers among the web development community are npm (Node Package Manager) and Yarn.
Web Accessibility: Designing an Accessible Color Palette
Accessible content has been an increasingly important feature in various software products. To facilitate these accessibility goals, major web frameworks have been adopting accessibility design patterns into their respective libraries.
Best of Both Worlds – Deep SIEM Insights with Powerful Business Intelligence Dashboards: Google Chronicle + Looker
Security information and event management (SIEM) solutions collect a range of security and other data from security controls and devices throughout the IT environment.
Web Accessibility: How to Enable Access for Everyone
The web is fundamentally designed to work for all people, regardless of their hardware, software, language, location or ability, enabling the access to people with a diverse range of hearing, movement, sight, and cognitive ability.
Unify your SOC with Splunk Mission Control Plugins
Splunk Mission Control attempts to reinvent security operations, it’s a unified security operations platform that brings together security data, analytics, and operations under one umbrella.
An introduction on using SonarQube
SonarQube is a Code Quality Assurance tool that collects and analyzes source code, and provides reports for the code quality of your project.
How to use Nexus OSS User Access Management
Nexus OSS is a free artifact repository with universal format support. It provides a single source of truth for all your components, binaries, and build artifacts, as well as efficiently distribute parts and containers to developers.
Introduction: DevOps & Site Reliability Engineering
Site Reliability Engineering is a branch of engineering focused on reliability of systems, services, and products. Uptime, Resource Utilization, and Forecasting, System Reliability, Change Control, Systems Integration are all at the forefront and concerns of SRE.
Vulnerability detection using VulnDB integration with Nmap
Vulnerability management is the process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. It is crucial to computer security and network security.