Operations | Monitoring | ITSM | DevOps | Cloud

Fraud Detection: WFH Leading to Increased BEC and Phishing Threats - What To Look For

A lot has changed in the past few weeks. And the percentage of us working from home (WFH) has increased tremendously. With increased WFH, we rely more on email communication, and this increases the opportunities for abuse by others. One thing that has stayed constant: bad people want to do bad things. As we have seen in the past, when one avenue of attack is restricted, the fraudsters redouble their efforts in other areas, and online fraud attempts are already increasing during our new normal.

IAM Access in Kubernetes: How to Install Kube2iam

IAM is the de-facto method of authorization in AWS. Most Kubernetes “Quick Start” guides for AWS do not adequately cover how to manage IAM access in your pods. This blog series will first go over the security issues specific to AWS IAM on Kubernetes, then compare solutions, and then we will end with a detailed walkthrough for setting up your cluster with one of those solutions.

Motadata ServiceOps | An ITIL Compliant IT Service Management Platform

Introducing Motadata ServiceOps! An ITIL compliant IT Service Management platform which offers a single point solution that is simplified, easy-to-use and deploy, meeting the IT operation management and automation requirements. It eliminates manual complexities, encourages self-service, offers a modern interface to improve user experience, and provides meaningful insights that improve the overall quality of IT services.

Ensuring your web applications offer an ideal user experience while working from home

While the recent pandemic has removed much of the traffic from the roads, it has led to an unusual increase in traffic on the internet. Online services are reporting a huge increase in the number of visitors and requests, making it tough to keep up with seamless service delivery. While service providers and experts say the internet can hold up for now, organizations are already implementing measures to prevent network congestion and interruptions in service during the continuing pandemic.

How Sentry Uncovers Blind Spots for Tability

With a service designed to help remote teams run more efficiently, Tability’s success relies on application reliability and deliverability to help its users keep complicated projects on schedule. This is why Tability has relied on Sentry error monitoring to identify issues in code and scale development work efficiently.

The Wellcome Sanger Institute turns to Canonical for high level Ceph support

The Wellcome Sanger Institute, a global centre of excellence for genomic research, leads the scientific advancement of areas such as cancer, infectious diseases and cellular genetics. With a need to collaborate and share data with other centres around the world, The Institute has to store, process and share vast amounts of data.

OpenMetrics: Is Prometheus unbound?

Historically, the monitoring landscape has been a mess; today, it still is. It’s even worse given how software architectures have changed with all of the cloud-native principles. As “techies”, we need to do something about this. Otherwise, we’ll remain chained up by an inability to properly observe our own platforms and applications.

Grafana vs. Graphite

This blog post will pit Grafana vs Graphite against each other, two of the most popular observability tools on the market today. R&D organizations typically implement a wide technology stack. They include varying services, systems, or tools to support their production and development environments. Most, if not all, of these companies have SLAs requiring R&D to provide high availability solutions and the ability to respond to incidents in real time.