Operations | Monitoring | ITSM | DevOps | Cloud

Zoom into Kinsing

The Kinsing attack has recently been reported by security researchers, and it is well known for targeting misconfigured cloud native environments. It is also known for its comprehensive attack patterns, as well as defense evasion schemes. A misconfigured host or cluster could be exploited to run any container desired by the attacker. That would cause outages on your service or be used to perform lateral movement to other services, compromising your data.

8 Common Elasticsearch Configuration Mistakes That You Might Have Made

Elasticsearch was designed to allow its users to get up and running quickly, without having to understand all of its inner workings. However, more often than not, it’s only a matter of time before you run into configuration troubles. Elasticsearch is open-source software that indexes and stores information in a NoSQL database and is based on the Lucene search engine. Elasticsearch is also part of the ELK Stack.

Get ServiceNow data alongside SCOM, Pingdom and more

For those on an ITIL journey, ServiceNow appears to be the service to beat. ServiceNow has tremendous flexibility and thousands of different workflows to support your business. And if you’re using SCOM to populate your CMDB, you’re leaps and bounds ahead of the average organization. Sadly, that flexibility comes with the cost of being stuck inside of the ServiceNow web interface.

How Private Connectivity Can Eliminate The Fallacies Of Distributed Computing

In the first of our new technical blogs, Solution Architect Cameron Parry explains how network and cloud architects can effectively use Console Connect within their hybrid and multi-cloud environments. More than 20 years ago, Peter Deutsch and James Gosling outlined the eight fallacies of distributed computing.

Continuous Fiber Optic Health Monitoring with Centralized OTDR

Fiber optic cables carrying massive amounts of information on pulsating beams of light are a critical part of the physical infrastructure supporting our digital society. By their nature, these cables are highly exposed, spanning huge distances in territories beyond the control of a network operator whether underground, under water or on aerial cables, and popping up in equipment huts.

The Importance of Hardware Health Monitoring

A networking problem can come from almost any fault within the infrastructure, whether it’s a bandwidth bottleneck, configuration issues, or a faulty networking component. But more than half of IT system outages are caused by hardware failure. The ability to quickly identify and resolve hardware issues goes a long way toward ensuring optimized performance. While this may seem like a simple solution, there are many, many potential hardware failure points, each of which can contribute to a slowdown.

Remote working monitoring: A breach of privacy or a gateway to a work-from-home culture?

One benefit of the lockdown triggered by the coronavirus epidemic has been a renewed enthusiasm for working at home. Forced to let millions of employees work from home to avoid contagion, companies that had been hesitant about taking this step have concluded they can benefit from moving to a remote workforce.

Data World Highlights: T-Mobile Netherlands, Anodot Discuss the Future of Network Monitoring

During the Data World event, Erwin Halmans, Project Manager of Data-Driven Network Operations & Assurance at T-Mobile Netherlands, Shounit Lax-Swisa, CEO of Company Booster, and Anodot Chief Data Scientist and Co-Founder Ira Cohen got together to discuss the future of network monitoring.

AWS Well Architected Framework in Serverless Part I: Security

Welcome to part one of our five-part “AWS Well-Architected Framework in Serverless” series. In this article, we’ll give you a short introduction to the AWS Well-Architected Framework and dive deeper into the Security pillar to explain it and some actionable ideas related to it. To learn more about the AWS Well-Architected Framework (WAF) through the serverless lens and how to build Well-Architected architectures, make sure to attend our upcoming webinar on Friday, 27 November.