Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

Getting started with cloud security

Your application runs on containers and talks to multiple cloud services. How can you continuously secure all of it? With Sysdig you can. Continuously flag cloud misconfigurations before the bad guys get in. And suspicious activity, like unusual logins from leaked credentials. All in a single console that makes it easier to validate your cloud security posture. It only takes a few minutes to get started.

Detect suspicious activity in GCP using audit logs

GCP audit logs are a powerful tool that track everything happening in your cloud infrastructure. By analyzing them, you can detect and react to threats. Modern cloud applications are not just virtual machines, containers, binaries, and data. When you migrated to the cloud, you accelerated the development of your apps and increased operational efficiency. But you also started using new assets in the cloud that need securing.

Cloud lateral movement: Breaking in through a vulnerable container

Lateral movement is a growing concern with cloud security. That is, once a piece of your cloud infrastructure is compromised, how far can an attacker reach? What often happens in famous attacks to Cloud environments is a vulnerable application that is publicly available can serve as an entry point. From there, attackers can try to move inside the cloud environment, trying to exfiltrate sensitive data or use the account for their own purpose, like crypto mining.

Why Your Business Should Consider Private And Direct Connections To Google Cloud

Although it entered the market later than Amazon and Microsoft, Google Cloud has established itself as one of the top 3 mainstream public clouds through its Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) offerings, with a strong presence in Machine Learning, data analytics and AI (Artificial Intelligence). Google has also become known for an attractive pricing model for its cloud services.

Using SQL Clone with Githooks & Branch Policies in Azure DevOps

Switching branches quickly and testing Pull Request code when working on database changes is no easy thing, but fear not! Join Chris Unwin in this video to find out how you can set up SQL Clone to allow developers to preserve changes when switching branches, and how teams can review code against a live DB, rather than relying on the raw code in version control.

Boost Permissions Management with JFrog on Azure through Active Directory SSO

When you’ve chosen Microsoft Azure to host your JFrog Cloud Enterprise or Enterprise+ subscription, you’ll naturally want to make good use of the services Azure provides for security and user administration. DevOps security starts with who has access to your builds, releases, and automation.

10 Mistakes to Avoid When Sizing Cloud Resources

One of the most common concerns when moving to the cloud is cost. Given that cloud allows you to turn IT costs from CAPEX (long-term investments ex. in hardware equipment and software licenses) into OPEX (day-to-day operating expenses), it’s crucial to choose the right service and estimate it properly. In this article, we’ll look at the common pitfalls and discuss how you can avoid them to truly benefit from the cloud’s elasticity.