Security
SOAR vs. SIEM: Understanding the Differences
This post was written by Joe Cozzupoli. Scroll down to read the author’s bio. As the cybersecurity landscape evolves and threats become more sophisticated, organizations need to stay ahead with the right tools and strategies to protect their valuable data. Two...
Stop Trusting Container Registries, Verify Image Signatures
Introduction One of InfluxData’s main products is InfluxDB Cloud. It’s a cloud-native, SaaS platform for accessing InfluxDB in a serverless, scalable fashion. InfluxDB Cloud is available in all major public clouds. InfluxDB Cloud was built from the ground up to support...
Using Google Workspace Data for Security Observability
This article was originally published in The New Stack. Keeping your systems secure is a never-ending challenge. Not only is it necessary to monitor and secure your own tech stack, but each new service a company uses creates another potential avenue...
How We Use InfluxDB for Security Monitoring
At InfluxData, we believe it makes sense to use a time series database for security monitoring. In summary, it’s because security investigations are inevitably time-oriented – you want to monitor and alert on who accessed what, from where, at which time...
Fail2ban Monitoring with InfluxDB and Telegraf
This article was written by Robert Hajek, Development Lead at Bonitoo, a software consultancy based in Prague and an InfluxData Consulting Partner. If you have a server open to the internet on Port 22 (the default port for SSH servers), it’s...
Automating SSL Certificate Expiration Monitoring
In my previous work experience, monitoring certificate validation was critical to our team. These certificates were used to sign commercial transactions between the payment gateway (us) and other providers. That check was manual and depended on the calendar of one person....
Monitoring Endpoint Security States with InfluxDB
Several factors in recent years have increased endpoint vulnerability from organizations’ need to make access to data more fluid, to threats targeting mobile device access and networks, to the growing work-from-home and work-on-the-go trends. Endpoints connected to a network including remote...