Thundra Logo Z

The difference between Monitoring and Observability

Legacy methods based on handling predictable failures often do not work well while monitoring modern distributed applications. Efficient debugging and diagnostics require that the system be observable with a microservice architecture now ...
Thundra Logo Z

Frictionless Instrumentation with Lambda Layers

In many ways, serverless functions, like auto-scaling, pay-per-use, and reduced complexity, are great. When things go wrong and developers have a problem with their serverless architecture, they’re likely to check Amazon CloudWatch ...
Can We Have “Detection as Code”?

Can We Have “Detection as Code”?

One more idea that has been bugging me for years is an idea of “detection as code.” Why is it bugging me and why should anybody else care?First, is “detection as code” just ...
AI surveillance

Quarantine Monitoring: China Throws Privacy Out the Door

The world continues to reel from COVID-19, as the pandemic rages on. In China, government entities are explicitly stating they are in test, trace and isolate mode. In “COVID-19: Contact Tracing Your ...
Security Boulevard
WannaCry eBook

Why Data Security Matters to Business Agencies

The post Why Data Security Matters to Business Agencies appeared first on CCSI ...
public cloud

Managing Security and Privacy in the Public Cloud

As with any enterprise technology, there are benefits and challenges when creating IT environments in the public cloud. The benefits include cost savings and the ability to easily scale up and down ...
Security Boulevard
Ransomware Protection Checklist

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on CCSI ...
APTs

The Symbiotic, Parasitic Relationship Between Privacy, Security

Increasingly, at least in the law, privacy and security are diverging. There are cybersecurity lawyers who specialize in forensic investigations, data breaches, security regulatory compliance and ensuring that contracts protect the security ...
Security Boulevard