The Log Management Buyers Guide

The ITOps Times Log Management Buyers Guide features: Connecting the data dots through log management How does Graylog help companies with log management efforts? Report: SOCs wasting 25% of time chasing false positives Index-free logging is the way forward Log analysis and the challenge of processing Big Data A guide to log management tools … continue reading

ITOps Times Open-Source Project of the Week: Secreter

A new open-source project has been launched to make it easier to encrypt Kubernetes secrets. To enable this the project Secreter consists of two components. The first is a CLI tool that encrypts secrets and stores them outside of the Kubernetes cluster. The second is a Kubernetes operator for both creating and decrypting Kubernetes secrets. … continue reading

clock

Avoiding Downtime in the Hybrid Environment

We all know that downtime caused by IT outages can be costly. As much as $300,000 per hour according to Gartner. But, the additional costs of downtime are not always reported. And they can be nothing short of significant. Take the 2017 British Airways outage as an example. It stranded 75,000 passengers and, as a … continue reading

Cloud IAP dashboard

Google Cloud IAP now enables context-aware access to VMs via SSH and RDP

Google wants to make it easier to gain context-aware access to VMs with a new feature. Earlier this year, the company introduced context-aware access capabilities in Cloud Identity-Aware Proxy (IAP). Cloud IAP is used to provide controls over cloud applications and VMs running on Google Cloud. The new capability allows administrators to gain access to … continue reading

Sysdig Secure 2.4 Image Profiles

ITOps Times news digest: Sysdig Secure 2.4, Red Hat Enterprise Linux 7.7, Tenable’s asset discovery capabilities

Sysdig Secure 2.4 is now available. This new update adds runtime profiling and new interfaces. According to the company, these new features are designed to improve the experience of creating security policies. “Sysdig Secure 2.4 expands on its previous runtime security and vulnerability management capabilities with the addition of runtime profiling and the new policy … continue reading

How Coexistence Offers a New Strategy for Seamless Cloud-to-Cloud Migrations

The advantages of cloud computing have proven themselves in business practices. What organization wouldn’t want to lower capital expenditures and realize greater elasticity to grow its business? The benefits are many and companies have adopted accordingly. The RightScale 2019 State of the Cloud report from Flexera showed 94 percent of respondents rely on the cloud, … continue reading

Cloud Security Scanner Command Center

ITOps Times news digest: Cloud Security Scanner in GKE and Compute Engine, ManageEngine’s Log360 update, and ITSM Academy’s new course

Google has announced the general availability of its Cloud Security Scanner in GKE and Compute Engine. The new service will provide insights into app vulnerabilities and allow organizations to take action before those vulnerabilities can be exploited. Potential use cases include notifying organizations of common external vulnerabilities in their application, alerting them of accessible GIT … continue reading

traffic spikes in a city

Planning is half the battle when preparing for anticipated traffic spikes

It’s not always possible to predict massive traffic spikes, but some organizations are fortunate enough to have some idea of when their traffic will be increased. Those that do have that foresight can take steps to ensure that when the time comes, they are ready. For example, ahead of the 2018 midterm elections, the New … continue reading

Azure Dedicate Host interface

Azure Dedicated Host now available in preview

Microsoft has introduced a new Azure service that allows virtual machines to be run on single-tenant servers. With Azure Dedicated Host, organizations are able to more easily address compliance requirements for physical security, data integrity, and monitoring, according to the company. This new solution also aims to provide greater control over underlying hardware infrastructure, number … continue reading

AzureStealth logo

ITOps Times Open-Source Project of the Week: AzureStealth

It’s no surprise that attackers typically go for the “lowest-hanging fruit.” They want to spend as little time and get as much of a reward as possible. Often, this results in attackers targeting users with the most privileged level of access. AzureStealth is a new project that hopes to help IT teams gain more visibility … continue reading

Report: SOCs wasting 25% of time chasing false positives

Legacy tools are preventing security operations center (SOC) employees from reaching their full potential. According to a joint survey between Exabeam and the Ponemon Institute, SOCs waste 25 percent of their time on false positives because of incorrect security alerts. The companies surveyed 596 IT and IT security practitioners for the survey. The report highlights … continue reading

Titan Security Keys

Google improves enterprise security for its users

Google is constantly focusing on improving security for its customers and users. This week at Google Cloud Next ‘19 in Tokyo, the company continued on with that mission with improvements to enterprise security. The company introduced its Advanced Protection Program for enterprises. The program helps protect Google accounts of users who might be targeted in … continue reading

Red Hat OpenShift on IBM Cloud screenshot

ITOps Times news digest: Red Hat OpenShift now on IBM Cloud, TimeXtender introduces support for Microsoft capabilities, and JumpCloud releases AD Sync

Following IBM’s acquisition of Red Hat, IBM has optimized Red Hat OpenShift on its cloud service. Using Red Hat OpenShift on IBM Cloud, users will have a fast and secure way for deploying and managing container workloads. In addition, users will be able to scale across IBM’s data centers and regions and consistently monitor, log, … continue reading

Notre Dame fire

IT operations crisis management lessons from Notre Dame

I was on a conference call when the news flashed across my screen: “Notre Dame Cathedral is on fire.” The news was shocking — and heartbreaking. As the tragedy unfolded, I remember thinking, “How did this happen?” We now have some answers.The New York Times recently published an in-depth analysis of the events of that fateful … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!