Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Alert fatigue, part 3: automating triage & remediation with check hooks & handlers

In many cases — as you’re monitoring a particular state of a system — you probably know some steps to triage or in some cases automatically fix the situation. Let’s take a look at how we can automate this using check hooks and handlers.

Agile and DevOps: great union for IT

It’s been some time since devops and agile to walk side by side. Combining both has become the basic precept for any IT area, since that way you can get better business results. However, this union still generates much discussion. To better understand the two concepts, it is interesting to note that all of DevOps’ efforts within an organization are geared towards enabling “value delivery” to customers and businesses as quickly as possible.

The Sound of Silence: Threats from Without and Threats from Within

Recent news has broken about a group of hackers which appears to be operating out of Russia. The group, dubbed “Silence,” is believed to be involved in the theft of over $800,000 from multiple Russian and Eastern European financial institutions. However, what is particularly notable about this group is they seem to count at least one former cyber security professional among their number.

Simplifying security auditing, part 6: Compliance and the cloud

In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security. While those concerns are still valid, technological advancements have created new scenarios that need to be addressed.