Operations | Monitoring | ITSM | DevOps | Cloud

The new Google algorithm update and what you need to do before May

In May 2021, Google will be putting their new algorithm live which will have a direct impact on your page rankings in their search engine. Unfortunately, no one can hide from this new algorithm change, it will affect everyone who owns a website, especially those that don’t adhere to the new changes that are coming. Google’s update is to further improve user experience on the web.

Bigleaf with Big Problems: Does It Have the Solutions?

Your business seeks a high-performance, flexible, cost-effective, and more secure alternative to Multiprotocol Label Switching (MPLS). Welcome to software-defined wide area networks (SD-WANs)! An improvement over legacy dedicated MPLS circuits, SD-WAN solutions deliver easily manageable networks with a high quality of service (QoS). Yet, your IT team tells you that SD-WANs aren’t cloud-optimized or mobile-device friendly.

Conversational AI Chatbots- The Best Solution for Your Customer Engagement

Conversational AI chatbots are a new vector of artificial intelligence use case that makes the user experience satisfactory, providing immediate response. This technology enables users to converse with applications through various means, such as via text, voice, touch, or gesture, which are closely the same as humans. Users find it much more impressive as they can communicate with their vocabulary and terminologies.

How to prepare for changes in the workplace

Transitioning back to the office is becoming more of a possibility with each coming day. But managing the transition can leave you feeling overwhelmed. Where do you start? How will work be different after a year of working remotely? And how will you balance management of a remote and in-person workforce? The ServiceNow on-demand Back to Work webinar series can help you prepare for changes in the workplace post-COVID-19 in four key ways.

On-boarding Remote Workers with Service Watch

It’s been more than half a year since I joined Exoprise. When Covid-19 struck last year, it became clear that companies would expand their hiring requirements beyond local regions and find suitable candidates (just like me!). Remote work and the requirement for on-boarding remote workers no longer became a luxury. This is reflected in job portals and HR sites such as Indeed and Glassdoor where they began to insert a new tag “Remote WFH Option Available”.

Azure security 101: Security essentials, logs, authentication, and more

“Where necessity speaks, it demands”. This old saying seems particularly apt right now with the pandemic forcing organizations to completely change the way they think about their IT networks. That rapid shift to remote work has resulted in a massive demand for cloud-based services.

Managing CI/CD pipelines with Arm compute resource classes

CircleCI has released new Arm-based compute in preview. Arm processors and architectures are becoming widely available as development teams adopt them as compute nodes in many application infrastructures. Organizations that need to run microservices, application servers, databases, and other workloads in a cost-effective way will continue to turn to the Arm architecture.

Detect suspicious activity in GCP using audit logs

GCP audit logs are a powerful tool that track everything happening in your cloud infrastructure. By analyzing them, you can detect and react to threats. Modern cloud applications are not just virtual machines, containers, binaries, and data. When you migrated to the cloud, you accelerated the development of your apps and increased operational efficiency. But you also started using new assets in the cloud that need securing.

Cloud lateral movement: Breaking in through a vulnerable container

Lateral movement is a growing concern with cloud security. That is, once a piece of your cloud infrastructure is compromised, how far can an attacker reach? What often happens in famous attacks to Cloud environments is a vulnerable application that is publicly available can serve as an entry point. From there, attackers can try to move inside the cloud environment, trying to exfiltrate sensitive data or use the account for their own purpose, like crypto mining.

AWS CIS: Manage cloud security posture on AWS infrastructure

Implementing the AWS Foundations CIS Benchmarks will help you improve your cloud security posture in your AWS infrastructure. What entry points can attackers use to compromise your cloud infrastructure? Do all your users have multi-factor authentication setup? Are they using it? Are you providing more permissions that needed? Those are some questions this benchmark will help you answer. Keep reading for an overview on AWS CIS Benchmarks and tips to implement it.