Operations | Monitoring | ITSM | DevOps | Cloud

PowerShell and 'Fileless Attacks'

PowerShell had its beginnings as a way to enable administrators to perform their tasks both locally and remotely with unprecedented access to underlying Windows components, such as COM objects and WMI. Since being included in every major Windows Operating System since Windows 7, PowerShell based tooling is well proliferated for both legitimate and malicious use and includes common tooling such as SharpSploit, PowerSploit, PowerShell Empire, Nishang and Invoke-Obfuscation.

Debugging in production with Stackdriver Debugger - Stack Doctor

Did you know you can debug your code while it’s still in production? In this video, Yuri Grinshteyn speaks about the Stackdriver Debugger, and how you can use it with Node.js. More importantly, he talks about the two ways in which this tool can debug by creating snapshots, or logging in real-time. Product: Google Cloud Operation Suite; fullname: Yuri Grinshteyn;

The Uptime.com Report for 2019

Unplanned downtime can drive significant losses in the form of unrealized revenue. Teams may be caught off guard, or may face an outage outside their control, extending downtime hours unnecessarily. Without automated monitoring and alerting, teams face undetected outages that silently threaten SLA fulfillment. The recommendations in this report are best used as a guide on what trends may drive Site Reliability Engineering in the near term.

Five worthy reads: Implementing a successful remote work environment

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into how organizations are increasingly adopting a remote work model, and how they can equip themselves to build a synchronized virtual workspace. In the wake of COVID-19 and the subsequent mandates to stay at home, many organizations have implemented a remote work environment in order to maintain business operations.

SEMplicity: Scaling Large ECE Deployments

From the trenches: what does it really take to scale up a large Elastic security log deployment? Elasticsearch for enterprise security log storage & management is a hot topic today. Specular gains in performance, functionality and cost are ready for harvest. But what exactly does it take to create a large Elastic log storage infrastructure? This talk will present war stories related to at 150,000 events per second Elastic log storage implementation with 2 month retention built at a large commercial client.

Virtual Meetup: Elastic Workplace Search-Finding Where That Document Went

Supporting employees in a work from a home environment can be challenging. Do they have access to these systems? Can they locate the documents they need? This would be easier if documents are centrally located. In most organizations, documents can live in services like Dropbox, Goole Drive, and or Github. In this virtual meetup, I will show you how to create a search box between these different services and finally solve the question.. "Where did that document go?"

Webinar: Serverless At Scale: the Present and Future of Modern Cloud Architectures

In this webinar on 16 April 2020 we covered the following topics:

  • The main challenges of scaling modern cloud applications
  • Implementing well-architected best practices
  • Battle-tested architectural patterns
  • How to improve resilience and scalability