Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Tackling Financial Crime is a Matter of Data: Fresh Thinking on an Age-Old Problem

Financial firms need to take a holistic view on their financial crime defenses to keep pace with the changing crime landscape. Dealing with the onslaught of attacks has historically elicited a Pavlovian response to this age-old problem — increased regulations or tighter risk management protocols, which in turn have proven to be ineffective over the long term.

How to ingest data from Trello into Elastic Workplace Search

In our previous post, we introduced the concept of the Elastic Workplace Search Custom Source API as a means of adding data for which a prebuilt content source integration isn’t available. We used a simple example — a CSV file of contact information — to demonstrate the process along with the use of the associated REST API. In this post, we explore ingesting data from a more complex organizational source: Trello.

Tools to Manage Cyber Risk in a Growing Organization

Within the cyber security industry, it is well known that as a company grows, so does its attack surface. This trend lends itself largely to the fact that as more employees are hired, more company-owned machines (laptops, tablets, etc.) are distributed. The risk is that once a company-owned machine is given to an employee, it is up to the employee whether to follow the security best practices set forth by your company. Your technological asset has now become a security risk.

Crash Course on AWS CDK and Serverless with REST API and Data Lake Analytical Querying

This is a hands-on course on how to deploy a fully Serverless web app using the AWS CDK. You can use the resources declared in this demo application as a starting point to mix and adapt to your own architectures later, which should save you quite some time.

The Real Savings from Intelligent Alert Management

Alert noise is reaching an all-time high in IT organizations. The volume of these alerts from disparate tools and technologies has reached a point where they are greatly undermining the ability of IT organizations to properly manage, secure and optimize services and applications for users and customers. DEJ’s recent study on AIOps found that organizations currently spend $1.27 million annually on avoidable incident escalations that result from non-contextual and non-actionable alerts.

Reduce AWS bills with aws-nuke

Many of the organizations use AWS as their cloud infrastructure, and in general they have multiple AWS accounts for production, staging, and development. Inevitably, this would result in losing track of various experimental AWS resources instantiated by your developers. Eventually, you will be paying AWS bills for resources which could have been identified and deleted in time. So, how should you go about identifying and deleting such unnecessary resources? aws-nuke to the rescue.

Auditing and Reporting In Cloudsmith

What software assets does your organization use? What sounds like a simple question is anything but. If we include every package and dependency that ends up in the code we produce then for most development teams the truthful answer is ‘we don’t know’. As we’ve said enough times already, that really isn’t good enough anymore. And that’s one of the core motivations behind Cloudsmith.

Alarming and Incident Reaction on Azure - An architecture Guide for Enterprise Alert on Azure by Patrick Fontana

More and more companies move business critical communication instruments into a cloud based environment. This could be established in a partner datacenter or in a public cloud environment. The main deciding factors between these two options are the trust to the provider and the costs of the solution.

Crisis management during a downtime - How to communicate with customers

A website downtime for any online business can be a time of great concern, anxiety, stress, and panic. So many questions will go through the mind of the website owner, such as; A website downtime is indeed a nervy period for any online business, but most especially for small and medium scale businesses still trying to find their feet in a highly competitive and unforgiving business environment.

Inventory Management with a barcode scanner

No company likes to admit that it loses money because of poor inventory management. Whether it’s because you’ve lost the equipment or you don’t know who has it in their hands, you’re wasting time trying to find it, and as they say, time is money… Have you thought about inventory management with a barcode scanner? It’s best to take care of your inventory, and barcode scanner(s) might be the solution.