Operations | Monitoring | ITSM | DevOps | Cloud

The value of a stolen account. A look at credential stuffing attacks.

A type of credential reuse attack known as credential stuffing has been recently observed in higher numbers towards industry verticals. Credential stuffing is the process of automated probing of and access to online services using credentials usually coming from data breaches, or bought in the criminal underground.

Everything you need to know about .NET 5.0

If you’re a developer of .NET supporting enterprise apps developed in the .NET framework, you should know how the .NET 5 would impact your current enterprise app. Moving forward, there will be only one .NET to target macOS, Windows, Linux, iOS, Android, and more. Along with the release, there are new .NET APIs, language features, and runtime capabilities. The look and feel of the code and project files in .NET 5 would be the same, regardless of the type of app being created.

Cracked - 5 Annoying Compliance Problems for IT & Flexible Work

Are most companies right now thinking ‘everybody back to the office’, or ‘remote work forever’? My guess is neither. There is still too much uncertainty for businesses to lean heavily towards one option or the other. Instead, flexible work makes the most practical sense right now and I imagine that won’t change for some time. Yet, with flexible work can come plenty of compliance problems that can frustrate even the most agile and experienced of IT departments.

Monitor HiveMQ with Datadog

HiveMQ is an open source MQTT-compliant broker for enterprise-scale IoT environments that lets you reliably and securely transfer data between connected devices and downstream applications and services. With HiveMQ, you can provision horizontally scalable broker clusters in order to achieve maximum message throughput and prevent single points of failure.

On-Demand Webinar: Extending Your Fortigate Next-Gen Firewall to Kubernetes

Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls. Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.

A Decade of DevOps Design Patterns for Future Proofing your DevOps Strategy

It’s been more than a decade since the term “DevOps” was coined. Since then, DevOps has evolved, with more tools, technologies and processes to enable unparalleled digital transformation. The next decade and beyond promise even more innovation as DevOps becomes even more ingrained in the software delivery life cycle. But what’s next? And how can organisations prepare?

Demystifying CI/CD - Beyond the hype into reality

Are you taking advantage of the best practices and tools available to ensure the security and reliability of your software development and deployment in the cloud? Join Kelsey Hightower (Google Cloud) and Melissa McKay (JFrog) to discover the strategies and toolsets you need to maintain a reliable development and delivery infrastructure. Learn how to effectively implement a real CI/CD solution, all the way from a Git commit to a container running in your cluster.