BLOGS
Unlocking Business Success: Digital Experience Monitoring is a key
In today’s digital world, ensuring a seamless and optimal user experience is crucial for businesses to thrive. With the increasing dependence on digital technologies, monitoring and […]
Tracing the Origins of GoogleUpdater: Uncovering the Provenance Chain
How a GoogleUpdater got its start This 1+ minute video introduces the concept of provenance chains, tracking how one instance of the GoogleUpdater program got started. […]
Endpoint Logging: Historical Contexts and Alternatives
Introduction Modern operating systems have rich logging capabilities, useful for detecting a wide range of security threats. While the Federal Government mandates standards for configuring these […]
Achieving Strong Coordination Between ITOps and SecOps via a Unified AIOps Platform
Ennetix’s vision has always been to build a solution that combines performance (application and network) and security insights on a unified observability platform. Based on our […]
A Brief History of Networking: Part 2
This series of blog posts is intended to capture some significant events and inventions that shaped the evolution of networks as they exist today. As an […]
UEBA for Improving Network Performance and Saving Money
In Dorothy Denning’s seminal 1986 paper “An Intrusion-Detection Model”, she introduces her core concept in her second sentence: “The model is based on the hypothesis that […]
Threat Hunting with xVisor – Part 1
1.Spectrum of Intrusion Detection System (IDSs) Different people have varying expectations of an intrusion detection system (IDS). Some prefer a system that provides explicit tasks such […]
AIOps: Is it a Destination?
Digital transformation is really not an option, it is mandatory in the world we live in today – driven primarily by the way products and services […]