Release notes: Incident Reports, SSO, Auto Raise Priority, New Integrations
We’re extending iLert’s reporting capabilities with detailed incidents reports.
We’re extending iLert’s reporting capabilities with detailed incidents reports.
If you are familiar with minikube, a lightweight implementation of the Kubernetes ecosystem, then you may have also heard of Minishift. Designed as a development platform and delivered through a utility, this is the Red Hat OKD (Origin Kubernetes Distribution—formerly called OpenShift Origin) all-in-one implementation of Red Hat OpenShift. Being highly versatile, it can be deployed on varying platforms.
On the 16th of every month, we release an update to the Mattermost server. The release happens on the same day, every month, without fail. It’s a cadence that our customers have come to rely on, and it helps us deliver new features and updates with drumbeat regularity. Hitting this hard deadline every month while ensuring high-quality releases requires clear processes and organizational discipline. This is a challenge for any team.
Calico is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Docker EE, OpenStack, and bare metal. In this blog, we will focus on Kubernetes pod networking and network security using Calico. Calico uses etcd as the back-end datastore. When you run Calico on Kubernetes, you can use the same etcd datastore through the Kubernetes API server.
Welcome to the April 2020 edition of the Tigera Calicommunication newsletter! In the March edition, we discussed context-aware flow logs. This edition covers the next component of logging, the audit logs.
In times of crisis and challenge, the best in humanity comes out. We all want to help, we all want to pitch in and we all desire safety and health for our loved ones and communities. And we ideally want to assist genuinely – in a way that helps others without strings attached. JFrog is no different.
The COVID-19 crisis has put organizations in a position where 100% of employees need to work remotely from their homes. Popular technologies used for supporting remote employees include Citrix virtual application and desktops, virtual desktop technologies based on VMware Horizon, cloud-hosted desktops (DaaS), or just VPN connectivity. Until now, remote access from home was something a small percentage of employees used.
For many of us, “working” is incredibly difficult right now. That’s true at the organizational level, where maintaining business continuity and accounting for changes in customer needs are even more critical. But it’s also true at the individual level, where the sudden shift to working from home has jolted us all into working in new ways, and made virtual collaboration an essential part of each workday.
This is a guest post by Ryan Ordway, DevOps Engineer at Oregon State University. At Oregon State University Libraries & Press (OSULP) we have been using Honeycomb for about 18 months. We were in the beginnings of automating our infrastructure and needed an APM solution that we could scale with. New Relic was becoming too expensive, and we couldn’t afford to monitor our whole infrastructure and trace all of our applications anymore. Thus began our Observability journey.
In Part 2 of this two-part series, our goal is to provide security practitioners with better visibility, knowledge, and capabilities relative to malicious persistence techniques that impact organizations around the world every day. In this post, we’ll explore two additional persistence techniques that are being used by attackers in the wild: Scheduled Tasks (T1053) and BITS Jobs (T1197).