Monitoring
The difference between Monitoring and Observability
Legacy methods based on handling predictable failures often do not work well while monitoring modern distributed applications. Efficient debugging and diagnostics require that the system be observable with a microservice architecture now ...
Frictionless Instrumentation with Lambda Layers
In many ways, serverless functions, like auto-scaling, pay-per-use, and reduced complexity, are great. When things go wrong and developers have a problem with their serverless architecture, they’re likely to check Amazon CloudWatch ...
Can We Have “Detection as Code”?
One more idea that has been bugging me for years is an idea of “detection as code.” Why is it bugging me and why should anybody else care?First, is “detection as code” just ...
Quarantine Monitoring: China Throws Privacy Out the Door
The world continues to reel from COVID-19, as the pandemic rages on. In China, government entities are explicitly stating they are in test, trace and isolate mode. In “COVID-19: Contact Tracing Your ...
Why Data Security Matters to Business Agencies
The post Why Data Security Matters to Business Agencies appeared first on CCSI ...
Managing Security and Privacy in the Public Cloud
As with any enterprise technology, there are benefits and challenges when creating IT environments in the public cloud. The benefits include cost savings and the ability to easily scale up and down ...
Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring
The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on CCSI ...
The Symbiotic, Parasitic Relationship Between Privacy, Security
Increasingly, at least in the law, privacy and security are diverging. There are cybersecurity lawyers who specialize in forensic investigations, data breaches, security regulatory compliance and ensuring that contracts protect the security ...

