Lessons from Trello’s API Exposure: Securing Your API Endpoints
In January 2024, Trello, the popular project management tool owned by Atlassian, fell victim to a significant security…
API Monitoring: Your First Line of Defense Against Costly Security Breaches
We keep hearing about API attacks leading to data loss and security breaches from large, even technology-based, corporations…
Twilio Data Breach – API vulnerability – The Importance of Protecting Personal Data
In July 2024, Twilio confirmed a significant API vulnerability affecting its Authy service, highlighting the growing risks of…
What is An API Gateway?
What is an API Gateway and why do I need one? As the enterprise landscape becomes increasingly complex…
Dell Data Breach – When API Security Goes Wrong
In the tech world, API security isn’t just an option—it’s a necessity. Even the most seasoned players can…
API Governance Framework
Application Programming Interface (API) Governance is an emerging discipline in organizations that own and deploy APIs or services…
Validating Splunk Dashboards – A Testing Automation Approach to Quality, Reliability, and Assurance
Testing and validation practices are one of the cornerstones of robust software development. Anyone can write code, but…
You Need a Health Check to Optimize Your Splunk ROI
Optimize your Splunk ROI: Health Check your Usage & Data A well-maintained Splunk environment supports efficient data ingestion…
Empowering Industrial Resilience: Safeguarding OT Environments with Splunk
In the quickly-changing landscape of modern industry, where the rhythmic hum of machinery meets the continuous flow of…
Visualizing API Traffic Flows with API Audit Logging
Effective Logging – Unlocking API Insights In today’s API-centric digital landscape, having a proper understanding of which API…
OWASP 2023 Top 10 Explained
What is OWASP? OWASP is the “Open Web Application Security Project.” It is a non-profit organization that focuses…
Service-Minded Security: Enabling Agile Teams in a DevSecOps World
Organizational transformation affects teams in every specialization. More than ever, organizations are transforming towards Agile and DevOps Product…
From Data Trails to Governance Tales: The Critical Role of Transaction Logging in API Governance
APIs (Application Programming Interfaces) are the backbone of software systems, enabling applications to communicate with each other seamlessly…
Lessons Learned from a Splunk Cluster Hardware Migration
There are many reasons why you may choose to migrate hardware within your Splunk cluster. These could include aging…
Harnessing the Power of splunk-launch.conf to Customize Your Splunk Environment
Splunk, the industry-leading platform for real-time operational intelligence, helps organizations collect, analyze, and visualize their machine data. When…
Solsys Embarks on a Strategic Alliance with Boomi, a Gartner Magic Quadrant Leader in Integration Platform as a Service
TORONTO, ONTARIO, CANADA,November 15, 2023 /Read the full press release at EINPresswire Solsys, a pioneer in API Management…
Top Practices to Shield Your APIs from Attack!
In today’s rapidly evolving digital landscape, software serves as the cornerstone of organizational success. The nature of modern…
Solsys Labs – Practical Learning for Applicable Success
“Let me show you what that looks like,” is a powerful phrase when it comes to showcasing technology. …
Practices to Shield Your APIs from Attack
Did you know that 50% of organizations have experienced an API Security incident in the past 12 months?*…
Are You Protecting Your Data From Bots
In today’s world, bots are becoming increasingly common. In fact, in 2022 bots made up more than 40%…
Leveraging GEN AI for Splunk Development
By: Marek Suchomski AI has been in the forefront of technology news headlines for the past several months. …
15 Practices to Shield APIs from Attack: #8 – And Finally, Getting Started
In this series we have looked at 15 practices to shield your APIs from attack, and shown how…
15 Practices to Shield APIs from Attack: #7 – OWASP Top 10, Injection
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
How Kong Gateway’s Rate Limiting Plugin Can Protect Your Organization from DDoS Attacks
By Nicky Carlisle Distributed Denial of Service (DDoS) attacks are a growing concern for organizations of all sizes with…
15 Practices to Shield APIs from Attack: #6 – OWASP Top 10, Cryptographic Failures
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
15 Practices to Shield APIs from Attack: #5 – OWASP Top 10, Broken Access Control
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
15 Practices for Shielding Your APIs from Attack: #4 – Tools & Systems
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
15 Practices for Shielding Your APIs from Attack: #3 – Concepts, Cryptography, & Credentials
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
15 Practices for Shielding Your APIs from Attack: #2 – Teams & Tests
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
15 Practices for Shielding Your APIs from Attack: #1 – APIs at Risk
One of our customers, a leader in the Canadian Telecom Market, found that the need for a single…
Leveraging Splunk’s Toolkit to Begin Mastering Observability
Splunk’s recent acquisition of SignalFX introduced Splunk Observability Cloud as a powerful new tool in its arsenal of…
North American Telecom Leader Saves $3 Million+ Annually by Migrating to Next-generation API Connectivity
North American Telecom Leader saves 3 Million+ annually by migrating to next generation API connectivity We help businesses…
Why you need Observability-as-Code
By Nicky Carlisle As IT professionals, one of the key considerations in our field is how to effectively…
Convergence of Observability and Security
The Benefits and Approaches to Better and Safer Applications and Services What kind of information needs to be…
Observability & Security: The Benefits and Approaches to Better and Safer Applications and Services
Observability and Security are undoubtedly related. Security exposures and compromises happen in the dark, where no one is…
Yielding Optimized SPL Using TERM()
By Leor Roynsky SPL (Splunk Processing Language) is the fundamental way through which users interact with data in…
Splunk Cloud & Product Thinking
In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
Splunk as a Product Enabler for Security
In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
Splunk as a Product Enabler for Observability
In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
Thinking about Splunk as a Product
What is Product Thinking and How Does it Relate to Splunk? In this blog, the first of a…
Why Agile Works
Through my continued association with the Toronto agile community and as an organizer with the AgileTO meetup team…
ESI Technologies Welcomes Solsys to its Family of Affiliated Companies
Toronto, ON, May 25, 2021 – ESI Technologies announces today an important partnership and significant investment in Solsys…
A Coherent API Lifecycle Management Strategy
Without your CIO establishing a coherent API strategy, APIs are just another middleware software lacking any transformational value…
Telecom – API Economy in the COVID World
It has been more than a year living through COVID where we have witnessed significant uptick in digital…
The Case for API Gateway Self Service
Your API GW (or Gateways) are hard at work in your organization, securely sharing APIs or services to…
Solsys and Kong Announce Strategic Partnership
At Solsys, we build data-driven solutions to enable Digital Transformation for large enterprises. We are a premier consulting…
The Importance of APIs in the Online Travel Industry
There was a time when booking a trip meant going to a travel agent or directly to the…
A Quick Guide to Hiding Certain Splunk Fields
Alerts must be sent to the monitoring teams, but fields with sensitive information cannot be included. In a…
Fraud Management: Identifying and Alerting for an IP Threat
Scenario Data breaches affecting consumer data are notoriously common for businesses. In 2017, for instance, credit reporting agency…
Reporting Web Services Data Using KV Store Operations
Scenario In one of our customer implementations, one requirement was to pull data from a web service as…
Predictions for IT Trends in 2020 and Beyond
Technological advancements are coming at us at an alarming rate, and they come with benefits and risks that…
Debunking the Myth That Splunk is Too Expensive for Small Businesses
For years, Splunk’s reputation involved being only accessible to large enterprises with substantial budgets. A large part of…
Cloud Migration: What You Need to Know to Make Your Migration Successful
Cloud technology isn’t a new concept anymore—but still—some companies are delaying their migration in favor of inefficient legacy…
Solsys @ Splunk .conf19: What We Learned
Converting massive amounts of data into tangible business benefits has always been a primary challenge for the digital…
Solsys Signs New Cloud Integration Partnership With IBM
New partnership will improve delivery and integration of cloud technology Toronto, ON, October, 2019 – Solsys announced today…
The Importance of APIs for Your Business
Collaborating with others can help companies create new business opportunities, gain competitive advantage and foster innovation. Coupled with…
Are You Leveraging Predictive Analytics to Modernize Your IT Monitoring?
IT operations provide the necessary infrastructure that businesses rely on to reliably offer their core services. But managing…
Solsys’ Azure EventHub Application
Solsys is a technology service organization delivering business and technology services to Canadian market leaders. Solsys delivers agile…
What’s a Drop in the Bucket Worth to Your Company?
Candy giant Hershey saves millions of dollars per year by monitoring and measuring the tiniest drops of sweet…
Securing Enterprise API’s – the core of API Management
Those poor Kardashians. Although they already have more media exposure than any family could wish for, a few…
2019 Predictions for Cloud, IAM and Digital Intelligence
What will 2019 bring? Although no one knows for certain, it never stops IT analysts, researchers and pundits…
How to Manage the Cost, Performance and Security of Multi-Clouds
Do you have a clear view of what’s going on in your company’s cloud services? If your business…
Is Your Organization Prepared for Insider Threats?
Utilizing the power of Splunk combined with identity and access management solutions can prevent security breaches before they…
No post found