Operations | Monitoring | ITSM | DevOps | Cloud

Why You Should Go Serverless for DevOps

Over the last decade, DevOps has become an important part of software engineering culture, influenced by the wide adoption of microservices, containers and cloud computing. A recent step in the evolution of cloud-based and microservice architecture is the serverless computing – a code execution model where the cloud provider takes total responsibility for the operating system and hardware management.

How Log Analytics Improves Your Zero Trust Security Model

Over the past few years, cloud computing has passed through its hype and early-adopter phases. Now we are hitting the peak of migration from on-premise to cloud-based infrastructure. Consequently, this transition and the advent of cloud computing has dramatically changed the way we think about security. Namely, the security paradigm has shifted towards a Zero Trust Security Model.

Trick-or-treat down Halloween Cyber Street for cyber awareness

Halloween is perhaps the one night of the year where ghosts and ghouls roam freely on the streets. In reality, these are all just harmless children in costume; however, as you enter Halloween Cyber Street, you’ll come to find there are real threats lying in wait for an opportunity to strike. On Halloween Cyber Street, there are eight houses, each providing a webinar offering solutions on how you can protect yourself against different cyberthreats.

Formjacking - How it can Affect your Ecommerce Site

Data theft or data skimming is not a new problem, it has probably been happening since the birth of the paper form. Today is no different, it is still around and happening on a much wider scale, leveraging the internet and the proliferation of online shopping. A popular modern tactic for data skimming is called formjacking. Not heard of it? Formjacking enables organised criminals to steal sensitive customer data as it is entered into an ecommerce shop. To the end user, this process is invisible.