Kushagra Sharma's Blog Posts
Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.
Display Mode
Paginated
Filter
Author
Author URL
Limit
6

I Scream, You Scream, We All Scream For BOTS!
We are excited to announce our August Boss of the SOC (BOTS) V event! What’s new in BOTS V? I’m glad you asked. This year, we find our favorite brewery, Frothly, converting to a remote model and embracing the cloud for ‘all the things.'

Ransomware Groundhog Day: Elevating Your Program in a High-Threat Environment
REvil attackers exploited Kaseya, a highly trusted management software. Here's how security leaders can take actionable steps to improve your business's defenses.

REvil Ransomware Threat Research Update and Detections
On July 2, 2021, REvil group used Kaseya to distribute malware to its on-premises customers. Splunk has pushed out guidance to help understand and detect REvil. Learn more about the REvil ransomeware group, their tactics, and how to detect them using Splunk.

Kaseya, Sera. What REvil Shall Encrypt, Shall Encrypt
Kaseya VSA, remote monitoring management (RMM) software heavily used by managed service providers (MSP), was compromised by REvil, and is being used to distribute ransomware to its on-premises customers. Find out more on how to detect REvil in your environment.

Debugging Microservices with Distributed Tracing and Real-Time Log Analytics
Learn more about how Splunk APM and Splunk Log Observer make debugging microservices with distributed tracing and real-time log analytics fast and easy.

Fashionably Late: The Zero Trust Trend is Here to Stay
Whether you were hip to the zero trust trend before it started being cool, or are arriving fashionably late, learn how to leverage a data-driven approach to achieve zero trust outcomes and improve the overall security capabilities of the organization in the process.