With the shift to REST APIs, the risks involved in DevOps culture is increasing because of new attack vectors. What can be done to counteract this? To find out I asked an expert to share his thoughts with us on this subject. Dmitry Sotnikov is an 11-time recipient of the Microsoft MVP (Most Valuable Professional) award who curates APIsecurity.io, a community website for all things related to API security. For those of us who are security-minded (and who isn’t nowadays?) let’s pay close attention as Dmitry walks us through the risks and challenges of API security and how this relates to the DevOps culture. Read More »

I began my discussion by mentioning how AWS has been in the news a lot recently as various companies have left their sensitive business information stored in AWS exposed and vulnerable for hackers to obtain. This raised the question in my mind whether it really is that hard to secure your data stored in AWS. “If securing data stored on public clouds were too hard, leading companies wouldn’t have adopted the cloud,” Menachem said. “While we hear in the news about different companies leaving their sensitive information exposed, we need to remember that there are many more that are doing a good job protecting their data.” Read More »

Using Azure Portal, we can easily manage virtual networks and firewall settings in any given Azure Storage Account, and we have a brief overview of the steps required to configure in the following section of this article. However, our focus will be creating a Runbook using Azure Automation to configure all Storage Accounts in any given subscription. All Storage Accounts will be set to use all existing virtual networks on their security, as well as static public IPs. Read More »

You can find AWS Quick Start guides for Jira Software, Bitbucket, Jira Service Desk, and Confluence online with use of AWS CloudFormation templates to deploy Data Center on AWS. What equipment is required for a Data Center installation? View an overview of Data Center architecture with Jira Data Center or Clustering with Confluence Data Center as examples. Read More »

I’ve known critical data centers to operate without power or additional cooling though, and they worked pretty well - the original architects of some of those facilities distributed a small installation that utilized existing HVAC environments and power, used UPS for small power outages, and had a generator brought in for major power outages. They were on a hospital grid, so outages were infrequent and well-planned. When they had major outages, they relied on distribution of the applications so that the applications would withstand losing a data-center or two. It was only about 40 racks, but it was very cost effective. Read More »

Networking is the backbone of the contemporary IT world. While advancements in the network field have been occurring at breakneck speed, they are also adding to the complexity of managing them. Technologies such as SD-WAN, 5G networks, WiFi6, digitized spaces, machine learning, and more are on the rise for networking. However, all these technologies need close supervision to ensure beneficial functioning. Building a network infrastructure often involves very complex processes of network setup, device management, manpower, and resources. While it is undeniable that an enterprise-level network setup cannot be drastically simplified, it can be well-configured or reconfigured to make it easier to handle and manage. Here are some of the most effective ways to simplify complex networks. Read More »

The most important skill to learn in today’s world is to know how to write a computer program. Today, computers have entered in almost every industry. Be it the autopilot in an aircraft or digital speedometer in your bike, computers in various forms surround us. Computers are extremely useful for an organization to scale up well. Gone are the days of pen and paper. Today, in order to store and access your information, you absolutely need computers. Read More »

Google is the undisputed king when it comes to information search engines. But the reality is, more and more web savvy people "quietly" turn their backs to the search engine giant because of privacy issues. One of the current alternative search engines is DuckDuckGo. Read More »

This guide is designed to equip professionals who are familiar with Amazon ... Amazon's stated limits, and these services are billed to your specific account. ... which configuration provides the best value in terms of flexibility, scalability, and cost. ... all services, and each is cross-platform, with binaries available for Windows, Linux Read More »

Microsoft exposed roughly 250 million customer service and support records in December 2019, according to this blog post by Comparitech. The leak was uncovered by a Comparitech team led by Bob Diachenko, who promptly notified Microsoft of the issue. The records, more specifically the databases that contained them, were indexed by the BinaryEdge search engine on Dec. 28. Within 24 hours, according to Diachenko, Microsoft had secured all servers. Read More »

A few years ago, Google "hunted" Apple's engineers, who were in charge of developing mobile chips for iPhones and other devices. But recently, some "trump card" engineers in Google's secret chip design team have quit. The three chip design engineers who left Google were Manu Gulati, John Bruno and Vinod Chamarty. Mr. Gulati and Mr. Bruno joined Google, after giving years to Apple, and Mr. Chamarty is a veteran of Qualcomm. Google confirmed the departure of these members, but declined to comment. Read More »

In early 2018, Let’s Encrypt announced it was about to offer a Wildcard SSL certificate. After many delays, we can finally sign up to activate this certificate for free. This is an important milestone towards the goal of making HTTPS a 100% protocol used on the Internet. Previously, Let’s Encrypt only issued Domain Validation SSL certificates - certificates for Domain Name. Read More »

If a domain expires and is neither renewed nor restored during Redemption Grace Period, then it enters a stage called Pending Delete. During the Pending Delete period, the domain can no longer be restored, renewed, or recovered by the previous owner or registrar and the domain is scheduled to become available for registration in 5 calendar days. Once the 5 days have passed, the domain is be released and the zone file are deleted. Read More »