Four Security Use Cases for New Relic Logs
You can learn a lot about the security of your systems through logs that track user/client actions. Learn how to send such logs to New Relic.
Continue Readingsecurity
You can learn a lot about the security of your systems through logs that track user/client actions. Learn how to send such logs to New Relic.
Continue ReadingTS;DR (too scary; didn’t read): Please stop re-using passwords, but longer with an aggressively awkward meter and it rhymes.
Continue ReadingNew Relic SVP and Chief Security Office, Shaun Gordon, shares insights into New Relic achieving FedRAMP Authorization to Operate
Continue ReadingMigrating an application to the AWS cloud isn’t a silver-bullet solution for security concerns. Our experts explain how to combine new tools and familiar security fundamentals to secure your own cloud journey.
Continue ReadingThe addition of audit logs and secure credentials API make it easier than ever to track and manage who’s using New Relic Synthetics.
Continue ReadingYou can now run the New Relic Infrastructure agent as a non-root user in one of two permission modes. Here’s how.
Continue ReadingSecure credentials is now available in New Relic Synthetics: here’s how to use it to easily add and change sensitive data across your scripts.
Continue ReadingIf security is warfare, we’re not winning. Esteban Gutierrez, New Relic’s Director of Information Security, has a better approach: security as nurturance.
Continue ReadingThe promise of DevOps is of a software-first world. But how do you make sure that DevOps is secure?
Continue ReadingAWS CTO Werner Vogels introduces AWS Secrets Manager and much more at AWS Summit San Francisco.
Continue Reading