Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Visibility and Troubleshooting Modern Applications with Calico Enterprise and OpenShift

Red Hat OpenShift is a great platform for hosting microservices, enabling developers to get up and running quickly. However, taking the next step from development to production imposes additional networking, security, and compliance requirements that must be addressed before Kubernetes apps can be widely deployed. Traditional networking tools, which were designed for relatively static IP environments, don’t have the context necessary to identify Kubernetes traffic flows, making it nearly impossible to effectively diagnose, troubleshoot, and resolve application connectivity issues.

Beyond SLAs: Getting to the Core of Service Delivery With XLAs

As a consumer, you most likely can agree that the overall experience in the buying process is equally, if not more, important than the product or service itself. Forbes actually says 73% of consumers say a good experience is key in influencing their brand loyalties. A haircut, a fancy meal, or a new pair of shoes were nice, but what if the hairstylist, waiter, or sales associate was rude to you? What if they weren’t attentive and treated you as if you were dispensable to the business?

Do you KYC?

Compliance has often been a checkbox exercise, primarily seen as a defensive strategy in preventing financial penalties and PR embarrassments. However, some organizations have taken a different approach. They’ve used compliance on the offensive - to give a competitive edge, turning “compliance teams” into “innovation teams”. These companies have improved processes and increased customer experience. They’ve installed an elevator instead of fixing the ladder.

How to Secure and Troubleshoot your Microservices Network on Amazon EKS

Many development teams select Amazon EKS as the best platform to run their microservices. Adopting Amazon EKS is easy, but running applications in production requires additional capabilities to meet compliance requirements, detect potential security incidents, and troubleshoot networking problems that can often occur.

Security Policy Self-Service for Developers and DevOps Teams

In today’s economy, digital assets (applications, data, and processes) determine business success. Cloud-native applications are designed to iterate rapidly, creating rapid time-to-value for businesses. Organizations that are able to rapidly build and deploy their applications have significant competitive advantage.

How IT professionals can close the cloud security gap in multi-cloud environments

In the midst of the COVID-19 pandemic, many businesses have faced uncertainty regarding the future. While some companies had to close down temporarily, others were able to move toward a remote workforce. By mid-April of 2020, the number of employed adults saying they began working remotely peaked at 62%. While this number will inevitably go down once the pandemic passes, it certainly seems like remote work has become more commonplace.

Filter Company Allowed 3.4 Million Customers to Shop on Hacked Site

Filters Fast knowingly allowed approximately 3.4 Million customers to shop on their compromised website for over 5 months, in a year-long data breach. FiltersFast.com sells a variety of home filtration products. The company is based in North Carolina, USA, and according to SimilarWeb, the company averages approximately 574,190 website visitors each month.