Latest Blogs


Monitoring NGINX with Applications Manager

NGINX is open-source software that started out as a web server and now provides various solutions such as web serving, reverse proxying, caching, load balancing, media streaming, and more. It also serves as a proxy server for email (IMAP, POP3, and SMTP) and a reverse proxy and load balancer for HTTP, TCP, and UDP servers.


Better BigQuery pricing flexibility with 100 slots

BigQuery is used by organizations of all sizes, and to meet the diverse needs of our users, BigQuery offers highly flexible pricing options. For enterprise customers, BigQuery’s flat-rate billing model is predictable and gives businesses direct control over cost and performance. We’re now making the flat-rate billing model even more accessible by lowering the minimum size to 100 slots, so you can get started faster and quicker.


The No Sweat Guide to Effective Switch Management

An on-site switch plays a critical role in a network: that of connecting your users to the rest of the IT infrastructure. Don’t think of that jack in the wall or under the cubicle as a simple Ethernet port. As part of effective switch management, you need to think of it as the mission-critical gateway to IT services that it is.


New Agent Tesla Variants Capable of Stealing Data from VPNs, Browsers

Some new variants of the Agent Tesla infostealer family are capable of stealing data from multiple VPN clients and web browsers. SentinelOne observed that attackers continue to deploy Agent Tesla across various stages of their operations, as this malware enables criminals with even low levels of technical expertise to manipulate and manage their victims’ infected devices.


Migrating applications to cloud with Amazon EventBridge

So what’s a monolithic application anyway? It’s essentially an application where almost every single piece of functionality has been written in the code by its developers and is typically built to run as a single unit on a single server. A typical example is WordPress, by far the main model in the past, and many applications are still developed this way today. Monolithic applications can come with a number of issues.


The Importance of ISO Certification in Manufacturing

For organizations that manufacture any type of product, overall quality and customer satisfaction are extremely critical. This is particularly important for companies that manufacture complex products, such as vehicles or medical devices. Note that vehicle manufacturers, particularly in the United States but also in other countries, have established their own quality standards for third party suppliers.


Civo Community Meetup #2: CI/CD focus w/ Sam Weston and Johannes Tegnér

For our second community meetup we focussed on using Civo for CI/CD through GitOps and Github actions for cloud native application development This installment featured talks from our CTO Andy, our Developer Advocate Kai, and guest talks from community members Sam Weston and Johannes Tegnér. The talks touched on a wide variety of topics within CI/CD, from automating builds to monitoring and observability. Here's what was on the agenda...


Monolithic to Microservices: Architecture and Data Management

In this article, we analyze the move from monolithic to microservices architectures, deep-dive into microservices communication types, and examine the best practices for communication between services with a retail application example. Disclaimer: This article is based on my personal experience and knowledge and there’s no definite “right” or “wrong”. Remember that you should always check what’s suitable for your application and business needs.


Netskope Threat Coverage: GuLoader

GuLoader is a sophisticated malware downloader that stores its payloads in Google Drive and Microsoft OneDrive. In addition to using popular cloud apps to evade network-based detection, it uses anti-VM techniques to evade sandbox analysis. Since it was first discovered in December 2019, GuLoader has become one of the top malware delivery mechanisms observed in the wild. It is used by multiple threat actors to deliver a variety of threats, most commonly remote access Trojans (RATs).