How to monitor Microsoft 365: Getting started

How to monitor Microsoft 365: Getting started

One of the most popular and widely adopted business tool suites is Microsoft 365 (previously known as Microsoft Office 365) or just M365 for short. M365 offers a comprehensive array of applications and services, including email, document collaboration, video conferencing, and more, all hosted on the cloud. M365 provides numerous benefits in terms of flexibility and accessibility, but it also introduces new security, performance, and compliance challenges. This is why monitoring M365 applications is critically important for organizations of all sizes. Monitoring M365 applications is essential in helping businesses maintain a secure, efficient, and compliant digital environment. ...

October 17, 2023 · 9 min · 1774 words · Harry Kimpel
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Enabling a true “shift-left” in software security by empowering DevOps and security teams to work together In some recent articles I shared how you as a developer can add security to your skillset by using New Relic capabilities. I also dug deeper into ways on how to mitigate hidden security risks of open source software libraries. Both of these blogs focused on third-party code and how it can impact the security of your software applications. In this article I will focus on the security of your own custom code, i.e. the code that you write yourself. ...

July 31, 2023 · 11 min · 2189 words · Harry Kimpel
Mitigate the hidden security risks of open source software libraries

Mitigate the hidden security risks of open source software libraries

Check your source code for any vulnerable libraries and start mitigating these issues Open source software libraries have become an integral part of modern software development. They are widely used by developers to accelerate the development process and reduce costs. On average, open source libraries make up 70-90% of an entire software application. However, the use of open source libraries also comes with hidden security risks that could potentially harm your organization’s reputation and financial well-being. ...

June 19, 2023 · 10 min · 2027 words · Harry Kimpel
Level up your security skillset with New Relic

Level up your security skillset with New Relic

Not every developer is a security expert, but use these tips to improve your skills In today’s digital age, security is a major concern for individuals and organizations alike. With the increasing number of cyber-attacks and data breaches, it’s crucial for developers to have a thorough understanding of security best practices. The security of an application is of the utmost importance, as it can directly impact the safety and privacy of users’ data. ...

May 15, 2023 · 7 min · 1289 words · Harry Kimpel
Updated Snyk Webhook Integration with New Relic

Updated Snyk Webhook Integration with New Relic

In a recent post I wrote about the ability to send all your application security vulnerabilities found by Snyk directly to your New Relic observability platform. Now, New Relic made it even easier to achieve that by providing a dedicated security ingest processor that ‘understands’ the payload from a Snyk webhook. All the details on how to get started, create and configure a Snyk webhook to send into your New Relic account is provided in this docs page: https://docs.newrelic.com/docs/vulnerability-management/integrations/snyk/ ...

April 12, 2023 · 2 min · 259 words · Harry Kimpel
How to send Snyk vulnerability data to the New Relic observability platform

How to send Snyk vulnerability data to the New Relic observability platform

Security and observability data go hand in hand when it comes to application health. If you can put those two sources of data behind a single pane of glass you can make your life a lot easier. By leveraging the different options that the Snyk platform provides, you can send all your application security vulnerabilities found by Snyk directly to your New Relic observability platform. Let’s see how! Prerequisites Here are all the necessary links to get started: ...

October 21, 2022 · 8 min · 1674 words · Harry Kimpel
Forward Snyk Vulnerability data to Splunk Observability Cloud

Forward Snyk Vulnerability data to Splunk Observability Cloud

TL;DR Leverage a Prometheus Exporter to send all your application security vulnerabilities from Snyk into Splunk. Here are all the necessary links to get started: Snyk Exporter: https://github.com/lunarway/snyk_exporter Splunk OpenTelemetry Collector for Kubernetes: https://docs.splunk.com/Observability/gdi/opentelemetry/install-k8s.html#otel-install-k8s Update (2022-09-22) The option that I am describing here is just one way to achieve this. There might even be a more straight forward option available that I started to describe in a more recent post. Please find an additional approach in my post Snyk Integration Capabilities with WebHooks - some examples. ...

September 13, 2022 · 3 min · 505 words · Harry Kimpel
How-To: Set-up New Relic to observe Dapr and it's applications

How-To: Set-up New Relic to observe Dapr and it's applications

How-To: Set-up New Relic to collect and observe metrics, traces and logs from Dapr and the underlying applications. Enable Dapr metrics and logs with New Relic Kubernetes integration for Azure Kubernetes Service (AKS) and application traces using OpenTelemetry. Prerequisites Azure Kubernetes Service kubectl An installation of Dapr on Kubernetes Perpetually free New Relic account, 100 GB/month of free data ingest, 1 free full access user, unlimited free basic users Enable New Relic Kubernetes integration The Kubernetes integration monitors worker nodes. In Azure Kubernetes Service, master nodes are managed by Azure and abstracted from the Kubernetes platforms. ...

November 21, 2020 · 8 min · 1531 words · Harry Kimpel
Microsoft Ignite - Azure announcements and more

Microsoft Ignite - Azure announcements and more

Just recently I attended Microsoft Ignite, Microsoft’s annual flagship technology conference with a focus on cloud and developers. The key theme this year was around “Tech Intensity” that Satya also talked about on LinkedIn earlier this year. Here is a quote from the LinkedIn post: There are two aspects to tech intensity: First, every organization will need to be a fast adopter of best-in- class technology, and equally important, they will need to build their own unique digital capabilities, which starts with workers who are deeply knowledgeable about the latest technology. I think of tech intensity as being an equation – (tech adoption) ^ tech capabilities = tech intensity – and as a company Microsoft is focused on providing the inputs to help our customers solve it. ...

December 2, 2019 · 4 min · 833 words · Harry Kimpel