Operations | Monitoring | ITSM | DevOps | Cloud

Detecting CVE-2020-14386 with Falco and mitigating potential container escapes

On September 14, CVE-2020-14386 was reported as a “high” severity threat. This CVE is a kernel security vulnerability that enables an unprivileged local process to gain root access to the system. CVE-2020-14386 is a result of a bug found in the packet socket facility in the Linux kernel. It allows a bad actor to trigger a memory corruption that can be exploited to hijack data and resources and in the most severe case, completely take over the system.

Monitor Your Azure VM's Using Event Grid and Logic Apps

With the accelerated pace of digital transformation, DevOps, adoption of new platforms, and also managing cloud resources are becoming increasingly challenging for central IT. Applying available best practices, compliance requirements and cost management are adding to the challenge. With the Serverless technologies, customers can apply such policies to cloud resources and run them over a long time.

Top Reasons Why You Need a Digital Experience Monitoring Strategy

Your cloud application or service can look pristine from an IT perspective, while the end-user identifies it as “glitchy” and “unreliable”. Though the technical issues may not be your fault, it still impacts the user’s perception of your company and brand. Issues could spawn from the user’s device limitations, the browser version, or a regional public cloud outage that is causing the poor user experience.

Reimagine All You Have Learned: APM and the Skills Gap

APM tools have been formerly and primarily siloed in the application development arena, with only the most important and mission-critical applications having their APM instrumentation extended into production use due to complexity and cost. In the modern world of application monitoring, the requirements for Dev and Ops need to be tightly integrated.

How Government Agencies Defend Against Increasing Cyberthreats

Whether military, a civilian agency, or even a public education institution, organizations across the public sector have witnessed a substantial increase in cyberattacks. There were a number of hits on education around this time last year, and then on health-related agencies as the COVID-19 pandemic struck. So, how do government agencies ensure their security posture is up to the task of defending against increasingly opportunistic forces of evil?

Let's Talk AIOps: Part 2: Things to Think About & the PagerDuty Approach

This is the second in a two-part blog series about AIOps where I sit down with Julian Dunn, Director of Product Marketing at PagerDuty, to level-set on the hot DevOps topic. The first post discussed whether AIOps was just marketing fluff and whether ITOps actually has an AIOps problem. Let’s continue…

Windows Server Monitoring with Pandora FMS

Pandora FMS is a proactive, advanced, flexible and easy-to-configure monitoring tool tailored to business itself. It adapts to all needs both in servers, network computers, devices and whatever is necessary. In this article, we will focus on Windows Server monitoring, using the software agent installed on our server.

Monitoring Java applications with Elastic: Multiservice traces and correlated logs

In this two-part blog post, we’ll use Elastic Observability to monitor a sample Java application. In the first blog post, we started by looking at how Elastic Observability monitors Java applications. We built and instrumented a sample Java Spring application composed of a data-access microservice supported by a MySQL backend. In this part, we’ll use Java ECS logging and APM log correlation to link transactions with their logs.

Hey - a Thoughtful Email Reinvention Tool from Basecamp

Email communication has been around for almost as long as the Internet. But although it continues to be of the best ways to provide a personal and direct conversation, it’s also a source of pain for many. Our inboxes have become an untidy clutter of messages, where most emails either are irrelevant or spam. Prominent email service providers such as Google have done a lot to improve the experience over time.

How to Implement a Strong COVID-19 Cybersecurity Plan

As COVID-19 forces more employees to work from home, companies are reevaluating their cybersecurity plans to place an increased emphasis on securing remote access, as well as phishing and ransomware prevention. Here are some of the most important security basics to include in your COVID-19 cybersecurity plan.