Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The Anatomy of a Secure Serverless Platform, Pt. 2 -- Development

Stackery’s secure serverless platform for AWS offers teams a key resource to help realize the promise of serverless – by automating otherwise complex infrastructure processes, we enable you to leverage the massive suite of AWS tools and services with minimal management overhead. It’s crucial for teams to do this while enforcing security and ensuring adherence to compliance guidelines.

Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 2)

In Part 2 of this two-part series, our goal is to provide security practitioners with better visibility, knowledge, and capabilities relative to malicious persistence techniques that impact organizations around the world every day. In this post, we’ll explore two additional persistence techniques that are being used by attackers in the wild: Scheduled Tasks (T1053) and BITS Jobs (T1197).

Topology Maps: Connecting the Dots for Hybrid and Multi-Cloud Infrastructure

In this article, learn: Given that enterprises use a mix of physical, virtual, and cloud native infrastructure, it can be a struggle to maintain the availability and performance of digital services. OpsRamp's Topology Explorer delivers visual representations of dependency relationships between application components and hybrid infrastructure that feed into both service maps and service-centric AIOps.

How IT Pros Will Help the World Come Out Stronger After COVID-19

In 2016, we wrote about the exponential value of computer networks and the importance of IT professionals as champions of the network, “doing their part to secure, maintain, and advance the engines that keep everything running.” Today, those words ring true in ways we could never have predicted four years ago.

Lost in the clouds: Managing risk and reaping rewards on your cloud journey

Moving applications to a public cloud, no matter why you’re making that journey, is a high-stakes proposition. As an industry, we’re focused on rapidly moving forward to give our businesses the competitive edge they need. However, when it comes to cloud migration, we often fail to stop and ask some critical questions, and as a result we end up overspending and underperforming.

The Wellcome Sanger Institute: sharing genomic research worldwide securely with supported Ceph

A world-leading genomic research centre, the Wellcome Sanger Institute uses advanced DNA sequencing technology for large-scale studies that surpass the capabilities of many other organisations. Among other works, the Institute is currently heading the UK-wide Darwin Tree of Life Project to map the genetic code of 60,000 complex species.

Covid-19 response drives decentralized IT Ops

As Covid-19 continues to dramatically affect the world, Interlink Software is squarely focused on supporting its customers and partners to continue to serve the thousands of employees and customers reliant on their services. Without the luxury of detailed, strategic planning, our customers have been forced to adapt at speed to current events, supporting an unprecedented number of employees as they transition to working from home. Interlink Software included.

InfluxDB is Now Available in Google Cloud Marketplace

In February, we announced the general availability of InfluxDB on Google Cloud, as well as a rich set of integrations that allow you to use our time series data platform to monitor your Google Cloud services, store sensor data from Google IoT core, and send your time series data to Pub/Sub for analysis on Google AI Platform.

IAM Access in Kubernetes: How to Install Kube2iam

IAM is the de-facto method of authorization in AWS. Most Kubernetes “Quick Start” guides for AWS do not adequately cover how to manage IAM access in your pods. This blog series will first go over the security issues specific to AWS IAM on Kubernetes, then compare solutions, and then we will end with a detailed walkthrough for setting up your cluster with one of those solutions.