Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Two Factor Authentication - What it is and How to implement it

One of the biggest pains of using the internet today is constantly being forced to create new accounts to use basic services on the internet. While many tech savvy users know to use password managers to allow them to create unique strong passwords for each website, the average internet user is much less sophisticated.

Getting Started with CFEngine - 2014-03-18

Learn how to avoid downtime by tracking system drifts, how to increase the robustness and security of your system, and make sure you adhere to compliance standards using CFEngine. In this "Getting Started with CFEngine" webinar we covered how to achieve all those benefits using CFEngine policies, promises, and sketches. Use the examples in these slides to start your own CFEngine implementation.

IT Automation with CFEngine - Business Value and Use Cases - March-2014

Automation has been central to infrastructure management and more recently to the continuous delivery of applications, DevOps. What has changed is the scale at which these are conducted. CFEngine delivers IT automation at Web-Scale. Scale in this context includes speed and agility along with size. So, smaller organizations can also benefit from IT automation for their infrastructure and continuous delivery needs.