Operations | Monitoring | ITSM | DevOps | Cloud

%term

From PowerShell to p@W3RH311 - Detecting and Preventing PowerShell Attacks

In part one I provided a high level overview of PowerShell and the potential risk it poses to networks. Of course we can only mitigate some PowerShell attacks if we have a trace, so going forward I am assuming that you followed part 1 of this series and enabled: Module Logging, Script Block Logging, Security Process Tracking (4688/4689)

Rome Wasn't Built in a Day

At any given time, most cities have an ongoing infrastructure project that seems to take longer than necessary. Snarled traffic, endless lines of cars, and the ever present orange barrel. A sign has started appearing in those situations. It says "Rome wasn't built in a day. If it was, we would have hired those engineers." It’s clever way to remind people that progress requires patience. Similarly, great service provider businesses aren’t built overnight.

From PowerShell to P0W3rH3LL - Auditing PowerShell

Imagine someone getting the seemingly innocent ability to run a couple of commands on a machine on your network WITHOUT installing any new software, but those commands resulting in a reverse shell running on that same machine – giving the intruder a convenient outpost in your network. Now stretch your imagination even further and pretend that all of this happens without leaving any unusual traces in logs – leaving you completely in the dark.

Software Configuration Management: Patterns, Best Practices, and Tools for Agile and DevOps

Software configuration management (SCM) is a set of processes, policies, and tools that organize the development process. The goal of SCM is to improve the speed of and quality by catching errors early and enabling quick fixes when they occur. Understand how to define SCM and discuss how to accomplish it.

Retrace Platform Major Update: Alerts and Notifications

The goal of Retrace's platform update is to improve system performance and resolve some outstanding defects. We incorporated a tremendous amount of feedback in order to help Retrace users produce and maintain high quality software systems. Get more details on the changes to alerts and notifications.

Data Snapshot: How Meltdown & Spectre flaws are affecting businesses

In recent years, revelations of security holes in widely used IT hardware and software have put IT pros on edge. A few times a year, a huge cybersecurity announcement introduces chaos into the IT world, forcing network and systems administrators to scramble to secure their environments and deal with the fallout.

AWS status: The complete guide to monitoring status on the web's largest cloud provider

If you’re hosting on AWS, you can expect some pretty excellent reliability and availability. If your service isn’t responding, it’s likely an issue with your own code. On the other hand, system outages do happen. They’re usually pretty minor. Sometimes they're not.