Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Implementing Backstage: Kubernetes Plugins

This second last part of the “Implementing Backstage” series explains how to use the Kubernetes plugin in Backstage using real-world scenarios. The previous installments covered getting started, using the core features, integrating with existing tools using plugins, and security and compliance. If you’re entirely new to Backstage and want to learn more, you can read the first entry in the “Evaluating Backstage” series.

Implementing Backstage: Kubernetes Deployment

This final part of the “Implementing Backstage” series focuses on how to deploy Backstage on Kubernetes. This tutorial is a direct continuation of Using the Kubernetes Plugin in Backstage, which you should complete before tackling this one. The other installments in this series covered getting started, using the core features, integrating with existing tools using plugins, and security and compliance.

3 Essential Mobile Apps for Optimizing Your Device

Mobile devices have already become an extension of ourselves. We rely on them for communication, entertainment, work, and so much more. However, to ensure that we are making the most out of our gadgets, it's essential to equip them with the right set of apps. In this article, we'll explore three types of must-have apps that will optimize your device and enhance your overall mobile experience: productivity, security, and entertainment apps.

Semper vigilans: how Platform.sh stays ahead of emerging cybersecurity threats (so you don't have to)

October is Cybersecurity Awareness month. So, we’ve asked Diogo Sousa, Platform.sh Security team manager to share how his team contributes to helping customers protect their websites and applications from external threats, 24x7.

Implementing Backstage 4: Security and Compliance

This is the fourth part of the “Implementing Backstage” series and explores how to ensure your Backstage application is secure and how Backstage can contribute to more secure practices in general. The previous installments focused on how to get started, using the core features, and integrating with existing tools using plugins. If you’re unfamiliar with Backstage and need an introduction, check out part one of the “Evaluating Backstage” series.

Security Considerations for Your Internal Developer Platform

In today's world, where cloud resources and data management tools play an increasingly critical role, the concept of an Internal Developer Platform (IDP) is gaining momentum. Imagine a platform where developers seamlessly design, build, and deploy applications. That's precisely the promise of IDPs. But here's the highlight: with great power comes greater responsibility. Security within IDPs isn't just an optional add-on; it's the core essence.

Can You Use the ELK Stack as a SIEM? A Fresh Take

A SIEM system (Security Information and Event Management) is often used by security operations centers (SOCs) for real-time detection of suspicious activity and security events. While some teams choose to adopt a purpose-built SIEM, others rely on the same DevOps tools they are already using for tasks like troubleshooting and operational log data analysis.

Advanced Access Controls with Mattermost Enterprise Edition

While some smaller companies may only need to use standard access controls to shore up systems, large organizations — particularly those with strict security, confidentiality, and compliance requirements — often require advanced functionality that gives them more authority over which users can access what systems and when.

Staying Ahead of Threats with Continuous Security Monitoring Tools for DevOps

According to the latest Crowdstrike report, in 2022 cloud-based exploitation increased by 95%, and there was an average eCrime breakout time of 84 minutes. Just as significantly, in 2021, the Biden administration passed an executive order to improve the nation’s cybersecurity standards. There are also upcoming laws like DORA in the European Union. So, increased cyber attacks and legislative pressures mean you need to (a) actively protect against threats and (b) prove that you are doing so.