spot_imgspot_imgspot_imgspot_img

IT Operations

4 ways to cut your cloud bills in half

The cloud began as a lucrative project and although it has been quite economical, maintaining a cloud account can get rather expensive. Servers are expensive and so are the chunky internet connections required for the servers to flourish. Additionally, there are numerous challenges when it comes to maintaining a...

A detailed guide for your Incident Response Plan

Every company that builds or maintains software should have an incident response plan at hand. If you do not have one, it's best to create it before an attacker compromises your system. A response plan is needed to fight incidents in the best possible way using a structured approach....

Testing your IaC templates: methods and tools to remember

Forget the days of manual provisioning and manual maintenance of your Virtual Machines, network infrastructure, firewalls, and security groups. Your infrastructure is created based on IaC templates. Since application deployments depend on it, it's important to have a reliable target environment. Those IaC templates need to be tested to...

Container Platforms and governance – the complete picture (part 2)

Container Platforms are hot - many organizations nowadays explore the options to acquire a "ready-made" solution or build one themselves. In the previous article, we explored a long list of the organizational challenges as well as some business-related aspects that are important. As a follow up we now present some...

Container Platforms and governance – the complete picture (part 1)

Nearly every (large scale) organization has adopted containers now in a certain shape or form. Containers and Kubernetes are still on the rise. The number of Kubernetes clusters grows rapidly and many of those organizations explore ways to acquire or build a so-called "container platform". They already see clear...

These OWASP Git repos help to strengthen your security skills

OWASP stands for the Open Web Application Security Program. It is a worldwide organization that follows security trends and provides standards and guidelines to embed security into software applications in every stage of their lifecycle. Many developers trust the OWASP Top 10 as one of the most comprehensive and...

The how, what and why of certificate management

All tech oriented organizations need to secure their assets. Whether it be an application that processes sensitive information, a website that acts as brochure-ware or a large database. Besides these, they also need to secure other forms of data storage and communication such as emails, credit card transactions and...

How to get started with Deployment Automation

Getting started with deployment automation can be overwhelming. The sheer number of choices and decisions can stall even the most avid DevOps enthusiasts. This is precisely why many organizations are doing CI (continuous integration) but aren’t going all the way to automating deployments. To help you understand how to...

What is AWS Copilot and how developers benefit from it

Producing software applications from idea to production involves a lot of steps. Your mind needs to wire every process together from the initial design to actually monitoring your application in production. Developers need to understand so many aspects nowadays, they heavily rely or even completely depend on other teams...

How a WAF protects your applications

Every team that hosts an application in the public cloud need to think about protecting it against hackers. For internet accessible applications, such as websites and APIs this is an absolute must. If you do not put enough time and effort in it, your data is in severe danger....