Operations | Monitoring | ITSM | DevOps | Cloud

Approaching Azure Kubernetes Security

The Splunk Security Research Team has been working on Kubernetes security analytic stories mainly focused on AWS and GCP cloud platforms. The turn has come now for some Azure Kubernetes security monitoring analytic stories. As outlined in my "Approaching Kubernetes Security — Detecting Kubernetes Scan with Splunk" blog post, when looking at Kubernetes security, there are certain items within a cluster that must be monitored.

I interviewed 200 CTOs from growing startups - here's what came up

Between late 2019 and early 2020, I interviewed more than 200 CTOs of growing US and EU startups on the topics of the Cloud and their working methodologies. I discovered that 86% of these SMB startups use the Cloud and that 48% started their business on Heroku and then migrated to a Cloud provider - especially AWS (Amazon Web Services).

Key Fortinet and Flowmon Integrations: Automated Incident Detection and Response

Flowmon has recently joined Fortinet’s Open Fabric Ecosystem by integrating with FortiGate and FortiSIEM. This cooperation brings automated system for threat detection and response, blocking security risks in their infancy, and giving time to administrators to carry out forensics.

Surviving IT in Snap Downturns

The global effect of and challenges to business in 2020 is the very definition of “unprecedented.” While large enterprises enjoy the advantage of scale to redistribute focus and sustain demand for their goods and services, small- to medium-sized businesses may not be as lucky. For example, your favorite restaurants and retail shops, both local and national chains, have been hit in previously inconceivable ways, and are doing everything in their power to survive.

Application Slowness Troubleshooting:Prove it is not the Network!

This article was originally published on NetworkDataPedia. The one complaint that an IT administrator dreads to receive is one where an end user says, “My application is slow!”. The application in question can be a web application, an enterprise application like SAP, Microsoft SharePoint, or a SaaS application like Salesforce or Office 365.

Announcing Status Pages

Communication is one of the hardest things to do well while responding to incidents. At FireHydrant, we’ve focused on helping people communicate well within their teams when responding to incidents, and also after the fact during post-incident reviews. But what about communicating with your customers? During an incident, your customers want to know that you’re aware of the problem and are working to mitigate or resolve it.

Permissions, access rights, and privileges: Active Directory and Azure Active Directory

Permissions, access controls, user rights, or privileges define what an identity can see or do in an organization. These terms are often used interchangeably based on context, and essentially perform the same function—granting or denying access to the resources in an enterprise.

Monitor Hazelcast with Datadog

Hazelcast is a distributed, in-memory computing platform for processing large data sets with extremely low latency. Its in-memory data grid (IMDG) sits entirely in random access memory, which provides significantly faster access to data than disk-based databases. And with high availability and scalability, Hazelcast IMDG is ideal for use cases like fraud detection, payment processing, and IoT applications.