Imagine a championship-caliber NBA basketball team losing its three best players to serious injuries halfway through the season. Devastated fans would immediately reduce their expectations from a championship to bottom feeder, and management would essentially give up on the season and focus on rebuilding the franchise. While a sports team might still bounce back after […]
Blog
-
Practical Guide: How To Act on Your CDN Logs for Increased Revenue & Security As CDNs become ubiquitous, our need to monitor and understand the operational performance of our solution becomes increasingly more important. Logs are a brilliant way to get insight into the health and performance of your CDN. Logs are often held up as a shining example of observability data, comprising an unstructured collection of quantitative and […]
28th February, 2022 -
Why Your Security Posture Needs In-Depth CDN Log Monitoring CDNs have become a standard component of any serious scaling strategy. With scaling, of course, comes an increased security challenge. This leads to code scanning, log analysis, expensive intrusion detection systems and more, but the data locked away inside of a CDN is often ignored. This data is essential to a strong security posture and […]
27th February, 2022 -
3 Things Heavy CDN Users Should Look for in a Monitoring Solution Utilising a CDN is an essential part of your web scaling strategy. Heavy CDN users rely on powerful monitoring solutions to improve their observability, gain new operational capabilities and develop key insights into their customers… but how do you pick the right observability tool? Let’s look at 3 key capabilities that any CDN user should […]
27th February, 2022 -
3 Industries that Can Benefit from Better CDN Monitoring In 2022, global CDN usage is expected to reach over 250 exabytes per month. With more and more industries reaping the benefits of CDNs, CDN monitoring is going to become a valuable new source of information for anyone looking to understand their operational challenges or how their customers interact with their product. Industries all over […]
27th February, 2022 -
5 Ways CDN Logs Can Transform Your Business Operations If you’re operating at scale, you’re probably already making use of a CDN. They’ve become ubiquitous amongst any company trying to handle large volumes of website traffic. It’s surprising then, that so many organizations rely heavily on their CDN, but they don’t take advantage of the wealth of observability data that a CDN offers. Our […]
27th February, 2022 -
2022: The Year End-User Accounts Go Passwordless Why Passwordless, Why Now? Advances in technologies pose new dangers online as more people use devices to do their shopping and finances. The remote work era pedaled, further extending technology adoption, so growing concerns regarding security and new methods are more valid than ever. Progress comes with leaving behind obsolete methods to improve efficiency and […]
23rd February, 2022 -
How to Automate Your Cloud Resource Cleanup – for Good Find leaky resources, manage quota limits, detect drift, and clean up… It’s the stuff that no engineer wants to deal with. Especially with today’s cloud environments reaching unmanageable levels of complexity. Cleanup usually means hand-jamming resources with shell scripts or in your cloud console. But new open source technologies allow you to achieve a constant […]
23rd February, 2022 -
Cloud Deep Learning: AWS, Azure & GCP Compared How Can You Do Deep Learning in the Cloud? Deep learning is at the center of most artificial intelligence initiatives. It is based on the concept of a deep neural network, which passes inputs through multiple layers of connections. Neural networks can perform many complex cognitive tasks, improving performance dramatically compared to classical machine learning […]
23rd February, 2022 -
Log4j Vulnerability: Are Your Applications at Risk? Why Should You Care? Log4j vulnerability can affect vendors and services across the software industry. The IT community has received a shockwave following the Log4j security vulnerability announcement at the end of 2021. Apache Log4j is a popular logging utility used in various applications. As a result, the Federal Trade Commission (FTC) issued a warning […]
21st February, 2022 -
Eluding the Dark Side of Cloud Computing: Cloud Data Loss Prevention 101 Publicly Stored Data is Never 100% Safe The benefits of a high-quality cloud service are well-known: Speed, scalability, improved agility, and reduced maintenance. On the flip side, your most valuable & sensitive business assets rely on centralized third-party servers. All these benefits mean that your business data’s safety, integrity, and accessibility depend on that third […]
20th February, 2022 -
How to Cover for Downtime Losses in 2022 The World is Cloudbound. Where’s the Catch? Q3 2021 earnings were tremendous for the three largest public cloud vendors – AWS, Azure and GCP. Revenue from their cloud operations grew 37% YoY, with the next ten largest cloud providers hitting the 28% YoY mark. The first cloud services were launched over a decade ago. In 2008, […]
16th February, 2022 -
Recent AWS Outages: Should You Panic? Amazon cloud services ran into significant difficulties in December 2021. Three major AWS outages affected financial institutions, airline reservation systems, online retailers, and dating apps. The incidents were global phenomenons. Companies like Spotify, Venmo, Netflix, Tinder, and Roku experienced service disruptions. One of the outages took down Amazon’s own delivery app, which led to packages […]
6th February, 2022