Over the past year, we have witnessed remarkable changes brought on by our response to a global pandemic. Along with accelerated digital transformation and the consumerization of technology, Covid-19 has birthed the everywhere workplace, where users work with any device, to connect to business-critical systems and applications. Work has become something you do rather than a place you go.
We’re excited to announce a new set of updates and enhancements to the PagerDuty platform! These updates are designed to empower DevOps, development, and customer service teams—as well as executives and stakeholders across the organization—and equip them with the tools they need to address business-critical work and get ahead of incidents.
In our previous blog post on Windows access tokens for security practitioners, we covered: Having covered some of the key concepts in Windows security, we will now build on this knowledge and start to look at how attackers can abuse legitimate Windows functionality to move laterally and compromise Active Directory domains. This blog has deliberately attempted to abstract away the workings of specific Windows network authentication protocols (e.g., NTLM and Kerberos) where possible.
Last week DevOps Institute’s Chief Ambassador, Helen Beal, and Moogsoft’s own Chief Evangelist, Richard Whitehead, continued to follow the exploits of DevOps Engineer Sarah and her journey towards AIOps and Observability enlightenment.
In this video with with Kohsuke Kawaguchi (KK) from Launchable and Viktor Farcic we talk about testing K8s applications. Do we really need to write all the tests every time we make a change to the source code or make a release? That could take minutes or even hours. Wouldn’t it be better to run only the tests related to the changes we are making or the phase of the lifecycle of an application? Is the future of testing in AI and ML?
It’s more critical than ever to secure your company data and protect your workloads in the cloud. This blog post is a roundup of the latest technical resources and product capabilities by both Google Cloud and Splunk to enhance your threat prevention, detection, and response techniques, regardless of where you are in your business-transforming cloud journey.