Operations | Monitoring | ITSM | DevOps | Cloud

Enhance API security with Apigee and Cloud Armor

APIs are great tools since they provide developers a simplified way to consume data and functionality that resides in backend systems. However, they are targets for malicious attacks because they contain business-critical information. In this video, we demo how Google Cloud can help you better secure your APIs with Apigee and Cloud Armor. Watch to learn how these tools offer security at multiple levels for your APIs!

Kubernetes Master Class: Declarative Security with Rancher, KubeLinter, and StackRox

As companies adopt containers and Kubernetes to accelerate application development, they’re wrestling with securing this new attack surface. Fortunately, the declarative, immutable nature of Kubernetes environments provides inherent security opportunities, and Kubernetes itself offers a broad set of native controls. However, these protections are not enabled by default, and many organizations are learning both the infrastructure aspects and the security aspects of Kubernetes in parallel.

Running commands securely in containers with Amazon ECS Exec and Sysdig

Today, AWS announced the general availability of Amazon ECS Exec, a powerful feature to allow developers to run commands inside their ECS containers. Amazon Elastic Container Service (ECS) is a fully managed container orchestration service by Amazon Web Services. ECS allows you to organize and operate container resources on the AWS cloud, and allows you to mix Amazon EC2 and AWS Fargate workloads for high scalability.

Azure Management Talk: 8 easy steps to improve your security posture in Azure

You've deployed your application on Azure. Instantly hackers are targeting your public IP and the brute forcing of passwords and ports starts. What now? Should I deploy Azure Sentinel, or just enable Azure Security Center as a start? Join MVP and Microsoft RD Maarten Goet as he takes you through the 8 easy steps into improving your security posture on Azure. This is a demo heavy session no cloud engineer or developer should miss!

What Are Shared Services? (Your Guide For 2021)

What are shared services? How does a shared service business model work? In this article, we will be breaking down everything you need to know about shared services. Are you trying to build a request-centric operations model that places an emphasis on simplified customer experience? We will be exploring the key benefits of adopting a shared services model. There has never been a better time to start exploring the consolidation of business operations.

The Mattermost server repo surpasses 20,000 stars on GitHub

In March 2021, the Mattermost server repository officially surpassed 20,000 stars on GitHub, and we couldn’t be more excited! Huge thanks to our community for their incredible support of the Mattermost open source project and their belief in the power of secure workplace messaging solutions built for developers by developers.

Tweaking Your Monitoring Strategy for a Seamless End-User Experience

Technology and end users have an almost dichotomous relationship; as technology gets more complex, end users expect a more seamless experience. At the same time, end users are also looking for maximized application availability and performance. How can a federal IT team meet these increasing demands? The answer is monitoring. Most monitoring instances have been implemented as an afterthought or as a way to solve a single, specific problem.

Application-Centric and Database-Centric Monitoring: Why You Need Both

How would you like it if your application shut down or started running slow without any warning? Let’s say, for instance, users who like your application try to access it, but aren’t able to. How would you know whether low traffic to your site is because users weren’t satisfied or because they simply weren’t able to access it? Users definitely won’t be satisfied when your application starts crawling with long response times.