Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Amazon EKS networking options

When setting up a Kubernetes environment with Amazon Elastic Kubernetes Service (EKS), it is crucial to understand your available networking options. EKS offers a range of networking choices that allow you to build a highly available and scalable cloud environment for your workloads. In this blog post, we will explore the networking and policy enforcement options provided by AWS for Amazon EKS.

Tackling the Unsustainable Skills Challenge in Cybersecurity and Observability

This is the third and final post in a series of blog posts about the disconnect between modern IT and security teams and the vendors they’re forced to work with. If you’re looking for the first and second posts, you can find them here and here.

Efficient data/file copying on modern Linux

Editing and copying large files or large numbers of files is slow. For a configuration management tool, it is probably one of the slowest things we do, apart from waiting for other programs to finish or waiting for network communication. In this blog post, we look at how to copy files. More specifically, the most performant approaches available on modern Linux systems. We are working on implementing these techniques so CFEngine and all your policy will copy files more efficiently.

How Tech Is Changing The Financial Services Industry

The digital era has marked an exciting era in financial services industry history, ushering in rapid change and disruption. From blockchain to artificial intelligence (AI), technological innovations are revolutionizing the financial services landscape and providing unprecedented opportunities and challenges for fintech enthusiasts and financial advisors. This blog post highlights key ways technology is impacting this sector while exploring its impacts and implications professionally.

What Is an SSL Certificate? How Does SSL Work?

SSL/TLS certificates are important for protecting online communication between websites and users. These digital certificates work as identity cards, checking the authenticity of a website and creating an encrypted connection to safeguard sensitive data. In this article, we will explain what SSL/TLS certificates are, how they function, and their role in maintaining online security and privacy.

The power of Kubevirt and Calico

Virtualization is a powerful technology that allows businesses to run multiple operating systems and applications on a single physical server. Kubevirt is an open-source tool that makes it easy to deploy and manage virtual machines (VMs) on Kubernetes and Calico is an open-source networking and security tool that provides easy yet robust networking and security for Kubernetes workloads.

Why Cloud Data Security is More Important Than Ever

In this digital age, more and more people and businesses are taking advantage of all the benefits of a cloud system. However, in parallel to this, people are also becoming increasingly aware of the importance of security in cloud solutions. This article lists some reasons cloud data security is more critical than ever.

Feature Friday #9: body file control - inputs

Did you know you can include one policy file from another? Traditionally you specify the files you want to make up a policy set using inputs in body common control found in your policy entry (promises.cf by default). body file control lets you specify additional inputs from any file that’s included in the policy and those files can include other files. Let’s check out a contrived example.

What Is Credential Management? Definition & Best Practices

Credential management is a security practice that secures and protects all types of credentials (such as passwords, certificates, and keys) within an organization. It identifies and authenticates users who can access specific information, ensuring that sensitive and mission-critical data are always protected.