Operations | Monitoring | ITSM | DevOps | Cloud

Simplifying security auditing, part 6: Compliance and the cloud

In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security. While those concerns are still valid, technological advancements have created new scenarios that need to be addressed.

Incident Management (class SRE implements DevOps)

In the previous video, Liz and Seth discussed how to make systems observable and how observability helps us diagnose failing systems, but didn't cover what to do when an incident grows beyond the ability of one person to do it all. In this video, you learn about the most important part of the incident management process – humans.

The Sound of Silence: Threats from Without and Threats from Within

Recent news has broken about a group of hackers which appears to be operating out of Russia. The group, dubbed “Silence,” is believed to be involved in the theft of over $800,000 from multiple Russian and Eastern European financial institutions. However, what is particularly notable about this group is they seem to count at least one former cyber security professional among their number.

Sensu

Sensu Inc. is the creator and maintainer of Sensu, the open source monitoring event pipeline. Sensu empowers businesses to automate their monitoring workflow and gain deep visibility into their infrastructure, applications, and operations.