Raspberry Pi Used to Steal 500MB of Data From NASA

Raspberry Pi Used to Steal 500MB of Data From NASA

Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for […]

How to Easily Search Windows Event Logs Across Hundreds of Servers with PowerShell

How to Easily Search Windows Event Logs Across Hundreds of Servers with PowerShell

When troubleshooting problems or investigating potential security breaches, the Windows event log is a great place to start. Windows provides an extensive list of various event logs grouped by a provider with a sometimes staggering number of events recorded within. With all of these events being recorded, it’s hard to figure out what’s going on. […]

3 Network Monitoring Functionalities That DevOps Teams Need

3 Network Monitoring Functionalities That DevOps Teams Need

Working in a DevOps environment, agility is everything. That next release needs to get into production quickly, so even a minor network issue can hamper speed and efficiency. Consider the different roles within a DevOps environment. You have your developers and testers deeply embedded in their dev and test environments, rushing to get the next […]

Monitoring AWS Resource Usage: Are You Just Taking Amazon’s Word For It?

Monitoring AWS Resource Usage: Are You Just Taking Amazon’s Word For It?

Amazon Web Services (AWS) have simply become a fact of life for most IT organizations. The benefits of outsourcing networking to Amazon’s cloud are simply too obvious to ignore or to not take advantage of. You get to stop worrying about infrastructure, heating, cooling, capacity, storage space, etc. and in return, Amazon sends you a […]

Don’t be like Facebook. How Configuration Management Can Prevent Outages and Security Issues

Don’t be like Facebook. How Configuration Management Can Prevent Outages and Security Issues

Improper configuration changes to a network—or even just one server on a network—can cause huge issues. They can degrade network performance, shut down key services, and even result in noncompliance with regulatory standards like SOX, PCI, HIPAA and FISMA. And they can compromise network security. You don’t have to look far to see the disastrous […]

5G is Coming – What Does It Mean For Your Business?

5G is Coming – What Does It Mean For Your Business?

Often perceived as a precursor to Industry 4.0, the rollout of 5G, if the marketing is to be believed, will allow innovations that were previously restricted or unreliable due to lack of bandwidth. Speeds of up to 10Gbps are promised by telecom companies but since we have yet to experience real-life usage scenarios, this is […]

How Device Roles Reduce Administrative Headaches

How Device Roles Reduce Administrative Headaches

Here’s a familiar refrain in IT media: Today’s corporate networks are much different than they were 10, five, or even two years ago. It’s cliched, but it’s true: Modern IT networks are bigger, messier, and more dynamic than they used to be. For system and network administrators, that means it’s now a lot more difficult […]

See It as It Happens: Live Activity View & Report in WhatsUp Gold 2019

See It as It Happens: Live Activity View & Report in WhatsUp Gold 2019

Your network is a living, breathing entity. Like a living body or an organic brain, it’s constantly moving things around and changing from moment to moment. Every single individual part is in continuous contact with and reacting to every other part. The job of your monitoring tool is to track all of this. Of course, […]