Utilising a CDN is an essential part of your web scaling strategy. Heavy CDN users rely on powerful monitoring solutions to improve their observability, gain new operational capabilities and develop key insights into their customers… but how do you pick the right observability tool? Let’s look at 3 key capabilities that any CDN user should […]
Resources
The world of cloud changes quickly.
Stay up-to-date with the latest trends & innovation, all explored in our resource library.
-
3 Industries that Can Benefit from Better CDN Monitoring In 2022, global CDN usage is expected to reach over 250 exabytes per month. With more and more industries reaping the benefits of CDNs, CDN monitoring is going to become a valuable new source of information for anyone looking to understand their operational challenges or how their customers interact with their product. Industries all over […]
27th February, 2022 -
5 Ways CDN Logs Can Transform Your Business Operations If you’re operating at scale, you’re probably already making use of a CDN. They’ve become ubiquitous amongst any company trying to handle large volumes of website traffic. It’s surprising then, that so many organizations rely heavily on their CDN, but they don’t take advantage of the wealth of observability data that a CDN offers. Our […]
27th February, 2022 -
2022: The Year End-User Accounts Go Passwordless Why Passwordless, Why Now? Advances in technologies pose new dangers online as more people use devices to do their shopping and finances. The remote work era pedaled, further extending technology adoption, so growing concerns regarding security and new methods are more valid than ever. Progress comes with leaving behind obsolete methods to improve efficiency and […]
23rd February, 2022 -
How to Automate Your Cloud Resource Cleanup – for Good Find leaky resources, manage quota limits, detect drift, and clean up… It’s the stuff that no engineer wants to deal with. Especially with today’s cloud environments reaching unmanageable levels of complexity. Cleanup usually means hand-jamming resources with shell scripts or in your cloud console. But new open source technologies allow you to achieve a constant […]
23rd February, 2022 -
Technical Whitepaper: Biometric Passwordless Authentication (FIDO2 WebAuthN) The booming cost of account takeover (ATO) attacks, from $4BN in 2020 to $16BN in 2021, makes passwordless authentication a truly pressing need for all businesses. Most current “passwordless” technologies still contain shared secrets and friction – deeming them irrelevant to the world’s most prominent workforce and buying power: Gen Y and Gen Z. Biometric […]
23rd February, 2022 -
Cloud Deep Learning: AWS, Azure & GCP Compared How Can You Do Deep Learning in the Cloud? Deep learning is at the center of most artificial intelligence initiatives. It is based on the concept of a deep neural network, which passes inputs through multiple layers of connections. Neural networks can perform many complex cognitive tasks, improving performance dramatically compared to classical machine learning […]
23rd February, 2022 -
Log4j Vulnerability: Are Your Applications at Risk? Why Should You Care? Log4j vulnerability can affect vendors and services across the software industry. The IT community has received a shockwave following the Log4j security vulnerability announcement at the end of 2021. Apache Log4j is a popular logging utility used in various applications. As a result, the Federal Trade Commission (FTC) issued a warning […]
21st February, 2022 -
Eluding the Dark Side of Cloud Computing: Cloud Data Loss Prevention 101 Publicly Stored Data is Never 100% Safe The benefits of a high-quality cloud service are well-known: Speed, scalability, improved agility, and reduced maintenance. On the flip side, your most valuable & sensitive business assets rely on centralized third-party servers. All these benefits mean that your business data’s safety, integrity, and accessibility depend on that third […]
20th February, 2022 -
How to Cover for Downtime Losses in 2022 The World is Cloudbound. Where’s the Catch? Q3 2021 earnings were tremendous for the three largest public cloud vendors – AWS, Azure and GCP. Revenue from their cloud operations grew 37% YoY, with the next ten largest cloud providers hitting the 28% YoY mark. The first cloud services were launched over a decade ago. In 2008, […]
16th February, 2022 -
Recent AWS Outages: Should You Panic? Amazon cloud services ran into significant difficulties in December 2021. Three major AWS outages affected financial institutions, airline reservation systems, online retailers, and dating apps. The incidents were global phenomenons. Companies like Spotify, Venmo, Netflix, Tinder, and Roku experienced service disruptions. One of the outages took down Amazon’s own delivery app, which led to packages […]
6th February, 2022 -
How to Mitigate the Top 11 API Security Risks What is an API? API is an acronym for an application programming interface. It is a set of rules that allow software programs to communicate. In the business world, APIs are important because they allow companies to share data and functions. It allows businesses to automate tasks and improve communication between departments. API also allows […]
6th February, 2022 -
Securing Chaos: Data-Driven Workload Protection for Today’s Cloud Challenges Securing today’s complex public cloud environments is really a data problem. While Cloud Workload Protection has greatly evolved over the last few years, it only does it halfway. In this webinar you’ll:
30th January, 2022