{"version":"https://jsonfeed.org/version/1.1","user_comment":"This feed allows you to read the posts from this site in any feed reader that supports the JSON Feed format. To add this feed to your reader, copy the following URL -- https://w2.influxdata.com/blog/feed/json -- and add it your reader.","home_page_url":"https://www.influxdata.com/blog/","feed_url":"https://www.influxdata.com","language":"en-US","title":"Blog \u0026#8211; InfluxData","description":"The Platform for Time-Series Data","icon":"https://www.influxdata.com/wp-content/uploads/cubo.svg","items":[{"url":"https://www.influxdata.com/blog/soar-vs-siem-understanding-differences","title":"SOAR vs. SIEM: Understanding the Differences","content_text":"This post was written by Joe Cozzupoli. Scroll down to read the author’s bio. As the cybersecurity landscape evolves and threats become more sophisticated, organizations need to stay ahead with the right tools and strategies to protect their valuable data. Two...","date_published":"Fri, 07 Jul 2023 07:35:00 +0000","date_modified":"Fri, 07 Jul 2023 07:35:00 +0000","authors":[{"name":"Community","url":"https://www.influxdata.com/blog/author/community-influxdata/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/2JmnP9sW4dwSkH0LDySMX5/547b897665187d3cbd848fae2bf8b31c/cubo-navy.svg"}],"tags":["Security"],"author":{"name":"Community","url":"https://www.influxdata.com/blog/author/community-influxdata/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/2JmnP9sW4dwSkH0LDySMX5/547b897665187d3cbd848fae2bf8b31c/cubo-navy.svg"}},{"url":"https://www.influxdata.com/blog/stop-trusting-container-registries-verify-image-signatures","title":"Stop Trusting Container Registries, Verify Image Signatures","content_text":"Introduction One of InfluxData’s main products is InfluxDB Cloud. It’s a cloud-native, SaaS platform for accessing InfluxDB in a serverless, scalable fashion. InfluxDB Cloud is available in all major public clouds. InfluxDB Cloud was built from the ground up to support...","date_published":"Tue, 18 Oct 2022 07:00:00 +0000","date_modified":"Tue, 18 Oct 2022 07:00:00 +0000","authors":[{"name":"Wojciech Kocjan","url":"https://www.influxdata.com/blog/author/wojciech-kocjan/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/49lM3PHfeTIedKFpNr6FZP/e7c851cc399e5b964d7250e8d1a0e14b/Wojciech-Kocjan.jpg"},{"name":"Tyson Kamp","url":"https://www.influxdata.com/blog/author/tyson-kamp/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/47dwwC5RX1ACiBrruAMqey/ae88d2f008ea90a369d0e3d9d5c3ec58/tyson-kamp.jpg"}],"tags":["Product","InfluxDB Cloud","Security"],"author":{"name":"Wojciech Kocjan","url":"https://www.influxdata.com/blog/author/wojciech-kocjan/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/49lM3PHfeTIedKFpNr6FZP/e7c851cc399e5b964d7250e8d1a0e14b/Wojciech-Kocjan.jpg"}},{"url":"https://www.influxdata.com/blog/using-google-workspace-data-for-security-observability","title":"Using Google Workspace Data for Security Observability","content_text":"This article was originally published in The New Stack. Keeping your systems secure is a never-ending challenge. Not only is it necessary to monitor and secure your own tech stack, but each new service a company uses creates another potential avenue...","date_published":"Mon, 18 Apr 2022 04:00:32 -0700","date_modified":"Mon, 18 Apr 2022 04:00:32 -0700","authors":[{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}],"tags":["Community","Developer","Security"],"author":{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}},{"url":"https://www.influxdata.com/blog/how-we-use-influxdb-for-security-monitoring","title":"How We Use InfluxDB for Security Monitoring","content_text":"At InfluxData, we believe it makes sense to use a time series database for security monitoring. In summary, it’s because security investigations are inevitably time-oriented – you want to monitor and alert on who accessed what, from where, at which time...","date_published":"Fri, 29 Jan 2021 04:00:13 -0700","date_modified":"Fri, 29 Jan 2021 04:00:13 -0700","authors":[{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}],"tags":["Product","Community","Developer","Security"],"author":{"name":"Darin Fisher","url":"https://www.influxdata.com/blog/author/darin-fisher/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/1hn6rZwGde9g8C3YwhviDw/98afca56d42397106af9ca7b418503c8/Darrin-Fisher.jpg"}},{"url":"https://www.influxdata.com/blog/fail2ban-monitoring-with-influxdb-and-telegraf","title":"Fail2ban Monitoring with InfluxDB and Telegraf","content_text":"This article was written by Robert Hajek, Development Lead at Bonitoo, a software consultancy based in Prague and an InfluxData Consulting Partner.\u0026nbsp; If you have a server open to the internet on Port 22 (the default port for SSH servers), it’s...","date_published":"Tue, 26 Jan 2021 04:00:13 -0700","date_modified":"Tue, 26 Jan 2021 04:00:13 -0700","authors":[{"name":"Community","url":"https://www.influxdata.com/blog/author/community-influxdata/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/2JmnP9sW4dwSkH0LDySMX5/547b897665187d3cbd848fae2bf8b31c/cubo-navy.svg"}],"tags":["Product","Community","Developer","InfluxDB Templates","Security"],"author":{"name":"Community","url":"https://www.influxdata.com/blog/author/community-influxdata/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/2JmnP9sW4dwSkH0LDySMX5/547b897665187d3cbd848fae2bf8b31c/cubo-navy.svg"}},{"url":"https://www.influxdata.com/blog/automating-ssl-certificate-expiration-monitoring","title":"Automating SSL Certificate Expiration Monitoring","content_text":"In my previous work experience, monitoring certificate validation was critical to our team. These certificates were used to sign commercial transactions between the payment gateway (us) and other providers. That check was manual and depended on the calendar of one person....","date_published":"Tue, 19 Jan 2021 10:00:01 -0700","date_modified":"Tue, 19 Jan 2021 10:00:01 -0700","authors":[{"name":"Ignacio Van Droogenbroeck","url":"https://www.influxdata.com/blog/author/ignacio-van-droogenbroeck/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/2uQ7pYUTUwlx63tcfNWoS5/363d21a9e5534f6a73658f04d7750e9a/Ignacio-Van-Droogenbroeck.jpg"}],"tags":["Product","Community","Developer","InfluxDB Templates","Security"],"author":{"name":"Ignacio Van Droogenbroeck","url":"https://www.influxdata.com/blog/author/ignacio-van-droogenbroeck/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/2uQ7pYUTUwlx63tcfNWoS5/363d21a9e5534f6a73658f04d7750e9a/Ignacio-Van-Droogenbroeck.jpg"}},{"url":"https://www.influxdata.com/blog/monitoring-endpoint-security-states-with-influxdb","title":"Monitoring Endpoint Security States with InfluxDB","content_text":"Several factors in recent years have increased endpoint vulnerability from organizations’ need to make access to data more fluid, to threats targeting mobile device access and networks, to the growing work-from-home and work-on-the-go trends. Endpoints connected to a network including remote...","date_published":"Wed, 09 Dec 2020 04:00:19 -0700","date_modified":"Wed, 09 Dec 2020 04:00:19 -0700","authors":[{"name":"Chris Churilo","url":"https://www.influxdata.com/blog/author/chrisc/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/7zDkE49kOljM6JiT78WHUM/654d83d364884bfbbc7353fc8484d25a/Chris-Churilo-1.jpg"}],"tags":["Community","InfluxDB Cloud","Developer","InfluxDB Templates","Security"],"author":{"name":"Chris Churilo","url":"https://www.influxdata.com/blog/author/chrisc/","avatar":"//images.ctfassets.net/o7xu9whrs0u9/7zDkE49kOljM6JiT78WHUM/654d83d364884bfbbc7353fc8484d25a/Chris-Churilo-1.jpg"}}]}