Once every few years, new technologies mature and reach a tipping point which requires a completely new outlook on the enterprise landscape, as it keeps evolving too. 2020 was such a tipping point, introducing cloud usage and remote work in unprecedented scales worldwide. In the context of cloud security, this tipping point created a burning […]
Resources
The world of cloud changes quickly.
Stay up-to-date with the latest trends & innovation, all explored in our resource library.
-
Automatically trigger CDN purge on S3 change A CDN requires an origin server, which can be a S3 bucket. s3-trigger-purge-cdn are python scripts that run as Lambda functions, and are triggered by file uploads to the bucket. Once triggered, the Lambda function will attempt to purge the old file from the CDN cache. Currently supported CDN vendors: Standalone Legacy mode While I […]
19th April, 2022 -
How-To: Collect SNMP with Sumologic Introduction SNMP is an application layer protocol which manages and monitors the connected IP devices. SNMP works on a Client-Server based architecture, where the clients are known as the SNMP Agents and the Server are called as the Managers. The clients are devices that are connected to the Internet, it could be switches, routers, printers, […]
19th April, 2022 -
Single vs. Multi CDN: Pros, Cons, Technical & Operational Considerations CDNs are crucial for user experience and your reputation Being around for a long time, CDNs are now an essential part of modern Internet service. A CDN helps a content owner deliver content at high speeds. This is done as a distributed system, where different servers are deployed in different datacenters worldwide and share the […]
18th April, 2022 -
Finally, Resource Optimization Hits Deep Learning: AI-Driven GPU Orchestration Introduction With the rise of artificial intelligence (AI), more and more businesses are looking to incorporate its capabilities into their systems. However, doing so can be difficult, particularly in GPU orchestration. GPUs are the heart of many computer systems. They can handle much of the heavy lifting required for complex calculations, such as gaming and […]
10th April, 2022 -
A CIO’s Security Tip for Financial Advisors Aware of the potential threats, financial advisers are increasingly utilizing security awareness training for employees, as well as better technological controls, to protect their data. Indeed, security awareness training ramped up in recent years among FSIs large and small, as a means to prevent cyber-intrusion — particularly as many struggle with infrequent customers access and hold very […]
5th April, 2022 -
As digital life gets cloudy, effective backups clear the sky for business continuity Imagine a championship-caliber NBA basketball team losing its three best players to serious injuries halfway through the season. Devastated fans would immediately reduce their expectations from a championship to bottom feeder, and management would essentially give up on the season and focus on rebuilding the franchise. While a sports team might still bounce back after […]
5th April, 2022 -
Infographic: Identity Automation Impact & Case Studies 75% of the IT work related to the employee lifecycle can be automated. For 56% of the organizations, this is the #1-priority workflow automation to implement. In the infographic below you’ll explore:
24th March, 2022 -
2022 Cloud Strategy #3: Cloud Governance To support cost-effective scaling, your cloud estate requires pre-planning, or re-planning. This includes a cloud security architecture that is manageable and cost-optimized by design. In this part 3 of our Cloud Strategy, you’ll find: What is cloud governance and why it’s needed The main elements of good governance: Anomaly detection, resource identification, tagging and CMDB […]
20th March, 2022 -
2022 Cloud Strategy #2: Cloud Security Tooling To support cost-effective scaling, your cloud estate requires pre-planning, or re-planning. This includes a cloud security architecture that enables full-speed business processes, while protecting you from cloud-native threats. In this part 2 of our Cloud Strategy, you’ll find: Why your business won’t survive without a cloud strategy 4 key technologies you should care to adopt […]
10th March, 2022 -
2022 Cloud Strategy #1: Choosing a Cloud Provider To support cost-effective scaling, your cloud estate requires pre-planning, or re-planning. The first step is an educated choice of cloud providers. In this part 1 of our Cloud Strategy, you’ll find: Why your business won’t survive without a cloud strategy AWS, Azure and GCP: What is each best for? Why use a multi-cloud architecture? Intro […]
9th March, 2022 -
Practical Guide: How To Act on Your CDN Logs for Increased Revenue & Security As CDNs become ubiquitous, our need to monitor and understand the operational performance of our solution becomes increasingly more important. Logs are a brilliant way to get insight into the health and performance of your CDN. Logs are often held up as a shining example of observability data, comprising an unstructured collection of quantitative and […]
28th February, 2022 -
Why Your Security Posture Needs In-Depth CDN Log Monitoring CDNs have become a standard component of any serious scaling strategy. With scaling, of course, comes an increased security challenge. This leads to code scanning, log analysis, expensive intrusion detection systems and more, but the data locked away inside of a CDN is often ignored. This data is essential to a strong security posture and […]
27th February, 2022