Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Top 5 AWS Services Every Developer Should know

AWS is a beast in cloud services and has more than 200+ services. It is not easy for a novice user to select the services that fit his need. Even after selecting the right service, you need to make sure you use it the right way because each service has many different variants. In this article, we will guide you about the top 5 most frequently used AWS services which every developer must know.

How to empower your team to own incident response

Responding to and managing incidents feels fairly straightforward when you’re in a small team. As your team grows, it becomes harder to figure out the ownership of your services, especially during critical times. In those moments, you need everyone to know exactly what their role is in order to recover fast. Moving to incident.io as the 7th engineer, from a scaleup of around 70 engineers, has given me a new perspective on what it means to own your code.

Implementing Microservices on AWS with the Twelve-factor App - Part 2

Welcome to the second post in a series of “Implementing Microservices on AWS with the Twelve-factor App”. In the first post, we covered the areas around the codebase, configuration, code packaging, code builds, and stateless processes. This article will go through the remaining areas for best practices in microservices. Let’s start the discussion with Port mapping!

Top 3 Ways Remote Working Has Unknowingly Increased Your Security Risk

Users across the globe have left their office buildings along with the safety and security of the workplace. This has left companies at their most vulnerable because the full scope of their security exposure is unknown. Attackers are wise to the gaps and vulnerabilities that come from remote working. Not only has the attack surface increased in recent months, but the volume of COVID-19 spam, phishing attacks and malware has also skyrocketed.

Uncovering the Manufacturing Security Risks in Today's Hybrid Working and Industry 4.0

Managing cyber risk is now a business imperative for manufacturing organizations to enjoy the benefits of Industry 4.0 and/or the move to long term hybrid working without falling victim to debilitating, expensive and public cyberattacks. As sophisticated threats including ransomware gangs and state-sponsored actors identify manufacturing as a preferred target, manufacturers struggle to respond to this threat with their current security tools and practices.

Securing SD-WAN in a Cloudy World

Today’s cloud-first enterprise must securely connect their workers to their applications, no matter where their applications may live. Only by transforming both the WAN edge and security architectures can the full promise of the cloud be fully realized. SD-WAN is your opportunity to re-architect, design and build a network that’s secure and fit for the future. Teneo Inc. and Silver Peak can help to make this a clear reality in our cloudy world.

Why Database Monitoring Tools are Important for Senior Business Leaders | Interview with Matt Gordon

Matt Gordon is a Microsoft Data Platform MVP and the Director of Data and Infrastructure at Rev.io. In this short video, he talks us through the 3 key reasons database monitoring tools are essential for him as a Director, and how they help him to lead a team successfully and productively.