Operations | Monitoring | ITSM | DevOps | Cloud

Automation

SecOps in a Post-Covid World: 3 Security Trends to Watch

By now, you’ve probably read loads of articles that discuss the COVID-19 pandemic’s impact on business, politics, the economy and much more.But what about SecOps? What permanent effects has COVID wrought on the way businesses secure IT assets? Let’s explore those questions by examining three key security trends that promise to endure long after the pandemic has finally receded.

CentOS 8 is end-of-life: Now what?

There were many reasons people came to use CentOS as an alternative Linux platform to Red Hat Enterprise Linux (RHEL). CentOS was originally built as a downstream release of RHEL, which was free to use without support. CentOS became the de facto standard for many organizations that did not want to use RHEL for production workload, since it’s basically the same thing, just rebranded.

4 ways automation can improve your security posture

Security is top of mind for many organizations—and for good reason. Recovering from a data breach is extremely costly. In fact, the average data breach costs more than $8.6 million in the US. One of the best ways to defend against cyberthreats is by adopting and implementing security automation.

How certificates work in Puppet

This video gives you a basic introduction to certificates and explains how they’re used to secure Puppet communications. Certificates help to provide secure connections between different parts of your infrastructure as those parts communicate with each other. When you run the agent for the first time, it submits a CSR (Certificate Signing Request) to the primary server. Then the CSR is reviewed by the Puppet administrator and either accepted or denied.