Monitoring and Observability

Latest Posts in

Five Steps to Developing an Application Modernization Strategy

Supporting legacy applications is problematic for several reasons. These aging systems are becoming increasingly obsolete and difficult to maintain. They use outdated software languages and unsupported hardware parts—some as much…

Why People, Processes, and Technology Cannot Change in Isolation

Since 2004, October has been designated by the National Cybersecurity Alliance as National Cybersecurity Awareness Month (NCSAM). Immediately, the mind wanders to supercomputers creating unbreakable algorithms against adversaries with unlimited…

The Perfect World (Without Outages)

Heaven on Earth would be a world with no outages. No slow load times. No failed switches or routers. No bandwidth issues. Just peace and quiet. But if nothing were…

Protecting Your Data Privacy

Protecting your identity is becoming more and more difficult. Though many people don’t stop to consider it, even the most minor conveniences can go hand in hand with an incredible…

Tips for Updating Your Cybersecurity Plan

Every year brings new opportunities for federal IT professionals to reduce risk by addressing threats—both existing and emerging—with new tools, technologies, and tactics. This year has proven to be a…

Can You Consistently Deliver the Digital Experience You’ve Promised?

If the users aren’t happy, then in short order, neither will anyone else be. The ubiquity of information technology has exposed users to the best the IT industry has to…

How Network Telemetry Is Becoming the New Normal

The work being done on federal, state, and local levels to ensure the health of society during and post-COVID-19 will be driven by the Internet of Things (IoT). From contact…

Tried and True Tech Tips

Anyone who’s worked in IT knows a great deal of the day-to-day work doesn’t come down to one secret trick—the job consists mainly of stringing together hard-won wisdom and convenient…

Building a Zero-Trust Model With SolarWinds Security Tools – SolarWinds Lab Episode #92

The zero-trust model is critical for building a successful strategy to detect both internal and external cybersecurity threats. This approach requires setting and maintaining strict access controls and “no trust”…

Why You Need Security Operations

A fully grown security operations center (SOC) was, until recently, a luxury, affordable for the largest organizations only, but even in global players, budget constraints are real. Unfortunately, the willingness…