spot_imgspot_imgspot_imgspot_img

IT Operations

SRE Tooling – Part 1 How and what

In our first post in this series, we discussed SRE and why it is an integral paradigm concerning modern-day operational functionality.  If you remember the principle of MADARR that we introduced in the first article, you will recognise that it is predicated on Observability. Without the correct and expansive...

What is SRE, and is it important?

Several buzzwords floating around in conversational circles have pushed themselves to the forefront to such an extent that they have gained some traction with the Recruiters. One that seems to have particularly piqued the Recruiter's interest is SRE, to the point that I now receive three or four calls...

Make non functional requirements practical – here’s how

Software applications and IT systems need to adhere to the demands and wishes of their end-users. Otherwise, they won't be used by them or they can disrupt the business in which they operate. Functional requirements describe which capabilities the system must support in terms of desired features. For example...

4 ways to cut your cloud bills in half

The cloud began as a lucrative project and although it has been quite economical, maintaining a cloud account can get rather expensive. Servers are expensive and so are the chunky internet connections required for the servers to flourish. Additionally, there are numerous challenges when it comes to maintaining a...

A detailed guide for your Incident Response Plan

Every company that builds or maintains software should have an incident response plan at hand. If you do not have one, it's best to create it before an attacker compromises your system. A response plan is needed to fight incidents in the best possible way using a structured approach....

Testing your IaC templates: methods and tools to remember

Forget the days of manual provisioning and manual maintenance of your Virtual Machines, network infrastructure, firewalls, and security groups. Your infrastructure is created based on IaC templates. Since application deployments depend on it, it's important to have a reliable target environment. Those IaC templates need to be tested to...

Container Platforms and governance – the complete picture (part 2)

Container Platforms are hot - many organizations nowadays explore the options to acquire a "ready-made" solution or build one themselves. In the previous article, we explored a long list of the organizational challenges as well as some business-related aspects that are important. As a follow up we now present some...

Container Platforms and governance – the complete picture (part 1)

Nearly every (large scale) organization has adopted containers now in a certain shape or form. Containers and Kubernetes are still on the rise. The number of Kubernetes clusters grows rapidly and many of those organizations explore ways to acquire or build a so-called "container platform". They already see clear...

These OWASP Git repos help to strengthen your security skills

OWASP stands for the Open Web Application Security Program. It is a worldwide organization that follows security trends and provides standards and guidelines to embed security into software applications in every stage of their lifecycle. Many developers trust the OWASP Top 10 as one of the most comprehensive and...

The how, what and why of certificate management

All tech oriented organizations need to secure their assets. Whether it be an application that processes sensitive information, a website that acts as brochure-ware or a large database. Besides these, they also need to secure other forms of data storage and communication such as emails, credit card transactions and...