Operations | Monitoring | ITSM | DevOps | Cloud

How To Secure Home Computers That Are Connected To Corporate Networks

Coronavirus is changing everything. But amid all the talk of shut-downs, quarantine, and stock market crashes, another huge impact of the current crisis has been a little overlooked: it’s consequences for cybersecurity. With hundreds of thousands of employees now working from home – in the US, Europe, and all over the world – many companies have had to rapidly put in place systems for them to connect their home devices to corporate networks.

How to simplify SNMP implementation

The following is a guest post from Jean Tunis, the principal consultant and founder of RootPerformance. You want implementations to be simple. Who doesn’t? But often, that’s not the case. SNMP is one of the oldest used protocols to manage a network. SNMP stands for simple network management protocol, but it might not have been all that simple for you. Maybe it was simple back in the late 1980s, when SNMP became a standard protocol for network monitoring.

Wind River and Percepio; from the Wind River Partner Program Series

Percepio CEO and founder Dr. Johan Kraft describes Percepio and its trace visualization products in the context of its partnership with the California-based multi-national embedded software powerhouse Wind River Systems. Percepio is a leading specialist in visual trace diagnostics. Providing advanced solutions and tools to help Wind River customers spot anomalies in their software during runtime, both in the lab and in deployed operation in the field.

Use Cloud Infrastructure Data Model to Detect Container Implantation (MITRE T1525)

A unified cloud infrastructure data model is fundamental for enterprises using multiple cloud vendors. Enterprise customers prefer to use multiple cloud vendors as a way to prevent being locked in and dependent on specific platforms. According to Gartner the top vendors for cloud infrastructure as a service in the years 2017-2018, are Amazon 49.4%, Azure 12.7% and Google with 3.3%.

IAM Access in Kubernetes: kube2iam vs kiam

IAM is the de-facto method of authorization in AWS. Most Kubernetes “Quick Start” guides for AWS do not adequately cover how to manage IAM access in your pods. This blog series will first go over the security issues specific to AWS IAM on Kubernetes, then compare solutions, and then end with a detailed walkthrough for setting up your cluster with one of those solutions.

Your 5G infrastructure monitoring checklist

5G technology, with its speed 10 times faster than 4G LTE, can help businesses realize many long-held goals, like real-time augmented reality (AR), virtual reality (VR), distributed machine learning within the Internet of Things (IoT), autonomous vehicles, smart cities, edge computing, etc. While 5G technology is imminent and likely to transform the pace of business operations, it will bring scalability challenges along with changes to networking architectures.

COVID-19: A Personal Guide to Self-Isolating and Remote Working

It’s now day 3 since UK PM Boris Johnson instructed the nation to stay at home and begin self-isolating and remote working to limit the spread of Covid-19. We’re all starting to realise life may not be going back to ‘normal’ anytime soon. Aside from our nation’s unsung heroes (the NHS, Supermarket Staff, Teachers, Postal Workers, Waste Collectors, the list goes on – thank you!), many are now turning to remote working.

What's The Difference Between Monitoring Webhooks and Background Jobs

If you have some experience setting up monitoring for different setups, this post is for you. Since different parts of your architecture have different tasks, they also have different expectations. Today, we’ll take a quick dive into how to deal with that reality and set up monitoring for it. Warning: In this post, you’ll have to bear with our enthusiasm for setting things up perfectly.