Why Port Monitoring is Important for Security

Why Port Monitoring is Important for Security

As IT pros already know, when we speak of ports, we mean the 16-bit virtual ports used when interconnecting systems i.e. during communication over protocols such as TCP or UDP and not physical connections on the system such as USB, HDMI etc. See the OSI model and list of port numbers and their assigned function if not an IT pro. Port 80 is commonly used for HTTP activity, for example, and many applications communicate using assigned default ports.

Raspberry Pi Used to Steal 500MB of Data From NASA

Raspberry Pi Used to Steal 500MB of Data From NASA

Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for that matter.

Using PowerShell to Search and Troubleshoot Windows Event Logs

Using PowerShell to Search and Troubleshoot Windows Event Logs

Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what if you are working locally?  Is there an efficient method to do the same? You will find the answer to these questions lies in Microsoft’s most powerful tool belt, Microsoft PowerShell.

As The Web Turns 30, The Digital Dark Age is Coming

As The Web Turns 30, The Digital Dark Age is Coming

The World Wide Web’s 30th birthday came and went this week, and though there was much to celebrate—just look how far we’ve gone since the days of America Online CDs and Yahoo! chat rooms— it also seems like the problems the Internet causes are beginning to outweigh the problems it solves.

Podcast: How DevOps Teams Use Network Monitoring Tools

Podcast: How DevOps Teams Use Network Monitoring Tools

Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal-use-only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. This is what has driven the DevOps methodology over the past several years.

Four Ways Network Monitoring Can Strengthen Your Security

Four Ways Network Monitoring Can Strengthen Your Security

The following is an excerpt from our Network Monitoring blog at whatsupgold.com/blog.

For most IT organizations, network monitoring is an essential tool. Network monitoring tools play an important role in letting IT pros get complete visibility into the status of network devices, systems, and applications, keeping the IT team aware of problems with services, networks, application performance, and more.