Operations | Monitoring | ITSM | DevOps | Cloud

Dashbird 2.0 - Monitoring for modern cloud applications

Dashbird 2.0 is a monitoring and intelligence platform for operating serverless applications on AWS. Dashbird is a platform designed to give organizations the confidence to build and operate complex serverless applications in modern cloud environments. Alert Automation, Observability, and Well-Architected Insights.

Quick tips to create an effective remote access plan for your organization.

In this webinar, you'll learn:

  • Specific challenges that your IT teams face while working remotely during the COVID-19 crisis
  • Cybersecurity implications of opening up privileged access to infrastructure and data center assets to IT technicians working from home
  • How to handle remote access requests to critical systems
  • Strategies for IT teams to effectively adapt to a remote work plan without compromising on access security
  • How ManageEngine's Secure Remote Access Toolkit can help a

Hardening Windows security: How to secure your organization - Part 2

We’re back with part two of our three-part blog series on living-off-the-land attacks. If you missed part one, you can read it here. In a nutshell, living-off-the-land (LOTL) refers to a type of attack where the attacker uses the tools and features that already exist in the target environment to carry out malicious activities. The concept of LOTL is not new, but LOTL and file-less attacks have been gaining popularity over the last few months.

Azure Functions Live - April 2020

The Azure Functions team has yet again joined us for another monthly live webcast by staying remote and safe. In this live webcast, along with Jeff Hollan, Anirudh Garg and Sonia from Engineering team joined us to give a picture on the latest happenings in Azure Functions space. Without any further delay, let us jump in as there are tons of update are awaiting.

New AppSignal Feature: Graph Builder

Dashboards should be easy to build and provide powerful insights. Our magic dashboards are already created automatically, so you don’t have to spend any time setting up these dashboards yourself. Many developers started tracking custom metrics that were unique to their applications. From these metrics, you can create custom dashboards and add triggers to get notified if values go outside of your desired range.

Impact of COVID 19 on IT Infrastructure & Shift in Priorities

So many aspects of our business & lives are under pressure right now due to the global pandemic. In the middle of all this, IT infrastructure still remains the backbone of the smooth business operations. Motadata is committed to helping individuals like you & your organization to get through these tough times. We are in this together. We can do this together. People in IT are always busy. Now your firefighters are working from home, you would not want to bother them for redundant tasks.

Performing Image Scanning on Admission Controller with OPA

In this post we will talk about using image scanning on admission controller to scan your container images on-demand, right before your workloads are scheduled in the cluster. Ensuring that all the runtime workloads have been scanned and have no serious vulnerabilities is not an easy task. Let’s see how we can block any pod that doesn’t pass the scanning policies before it even runs in your cluster.

Kubernetes Threat Intelligence: Detecting Domain Generation Algorithms (DGA)

Malicious actors often use Domain Generation Algorithms (DGA) to exploit the DNS protocol and execute command-and-control (C & C) malware attacks. In this webinar, threat researchers Manoj Ajuhe and Chris Gong from Tigera’s Threat Detection Team will be sharing the latest insights into DGAs, the risks they present, along with best practices to speed detection and mitigation.

10 Indispensable Amazon EKS Features and Updates You Ought to Know

Amazon’s Elastic Kubernetes Service (EKS) is the company’s managed option for Kubernetes clusters. We have several articles on using AWS and Kubernetes on our blog, and felt there was a need to highlight some of the key features that AWS EKS offers. Many of these features have been rolled out or updated over the last year. We have mentioned some of these features in other posts, such as our comparison of EKS with AKS and GKE.