{"version":"https://jsonfeed.org/version/1.1","user_comment":"This feed allows you to read the posts from this site in any feed reader that supports the JSON Feed format. To add this feed to your reader, copy the following URL -- https://w2.influxdata.com/blog/feed/json -- and add it your reader.","home_page_url":"https://www.influxdata.com/blog/","feed_url":"https://www.influxdata.com/blog/darin-fisher/feed/json","language":"en-US","title":"Blog \u0026#8211; InfluxData","description":"The Platform for Time-Series Data","icon":"https://www.influxdata.com/wp-content/uploads/cubo.svg","items":[{"url":"https://www.influxdata.com/blog/using-google-workspace-data-for-security-observability","title":"Using Google Workspace Data for Security Observability","content_text":"This article was originally published in The New Stack. Keeping your systems secure is a never-ending challenge. Not only is it necessary to monitor and secure your own tech stack, but each new service a company uses creates another potential avenue...","date_published":"Mon, 18 Apr 2022 04:00:32 -0700","date_modified":"Mon, 18 Apr 2022 04:00:32 -0700","authors":[{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}],"tags":["Community","Developer","Security"],"author":{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}},{"url":"https://www.influxdata.com/blog/how-we-use-influxdb-for-security-monitoring","title":"How We Use InfluxDB for Security Monitoring","content_text":"At InfluxData, we believe it makes sense to use a time series database for security monitoring. In summary, it’s because security investigations are inevitably time-oriented – you want to monitor and alert on who accessed what, from where, at which time...","date_published":"Fri, 29 Jan 2021 04:00:13 -0700","date_modified":"Fri, 29 Jan 2021 04:00:13 -0700","authors":[{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}],"tags":["InfluxDB","Community","Developer","Security"],"author":{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}},{"url":"https://www.influxdata.com/blog/influxdb-endpoint-security-state-template","title":"InfluxDB Endpoint Security State Template","content_text":"Our team recently discovered an exposed endpoint without authentication enabled, though we know it had previously been required. The root cause was a missing configuration as a result of a recent upgrade a few weeks earlier, and was easy to fix...","date_published":"Tue, 21 Jul 2020 07:00:08 -0700","date_modified":"Tue, 21 Jul 2020 07:00:08 -0700","authors":[{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}],"tags":["InfluxDB","Community","Developer","InfluxDB Templates"],"author":{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}}]}