Category: General IT
-
Making Security an Integral Part of DevOps
In the rush to innovate, steal a jump on the competition, and bring new software products to market, enterprises have embraced the concept of DevOps: the peaceful co-habitation of Development and Operations, for more effective co-operation between the two. But this competitive frenzy often overlooks a vital aspect: security. In this article, we’ll […]
-
Making PCI Compliance Less Stressful
If your business requires you to deal with credit card holders, you’ll have records of your customers’ account details. Both your customers and you will want to know that this information is kept safe, and free from prying eyes. It’s not just good business practice; it’s the law. And complying with this legal […]
-
Your Cyber-Threat Assessment for 2016
The year just past saw several high-profile cyber-attacks hit the news, and brought the whole issue of cyber-security firmly into the spotlight. With the lessons still being learned from 2015 in mind, let’s look ahead to what you should be wary of in the months to come. Home is Where the Hurt Is? “Smart” domestic […]
-
Best Practices for Monitoring Windows Logins
Enterprise network administrators usually implement some security and access control measures over standard user accounts, but may neglect service accounts, which become vulnerable targets. As proof against threats from malicious users inside or outside the enterprise – and to comply with regulatory authorities – it’s essential to keep a close eye on what’s […]
-
Best Practices for Monitoring Microsoft IIS Web Server
If you’re working on a Microsoft Windows NT or 2000 platform, chances are you’ll be using Microsoft Internet Information Services (IIS) to build and administer your Web site, search engine, databases, and related applications. This guide will help you monitor and optimise your working environment. What is Microsoft IIS Web Server? Formerly known as Internet […]
-
Will Windows go Open Source?
At the ChefCon meeting in April of this year, engineer Mark Russinovich (Chief Technical Officer of Microsoft’s cloud computing platform, Azure) revealed to conference delegates that [in his words] “it’s definitely possible” that Windows could take the open source route. Eventually. “Definitely possible”. But is that all? A Closed Shop Traditionally, Microsoft Windows and […]
-
Best Practices for Monitoring Microsoft Exchange
If your scheduling and email services run on the Windows Server platform, chances are you’ll be using Microsoft Exchange. As a systems administrator, it’s your responsibility to make sure that things run smoothly. If you know what to watch out for, your job will be that much easier. This guide should help. What is Microsoft […]
-
51 DevOps Influencers to Start Following Today
While the objectives of DevOps are to stop wasting time and money on IT projects that become slow, unwieldy and incredibly bureaucratic, the whole concept is really about people- perhaps more so than technology. It’s probably for this very reason that a community of evangelists and advocates has grown and become instrumental in sharing […]
-
How to Prepare for a DDoS Attack
With much of today’s commercial activity conducted via the Internet, it’s no wonder that corporate entities find themselves the target of assault by online intruders. Cyber-attacks are now an accepted part of life – and it’s up to administrators and security officers to establish how best to prepare and defend their organisations against them. […]
-
What is a Private Cloud?
According to the National Institute for Standards in Technology (NIST), cloud computing as a whole provides a measured and on-demand self-service, with pooled resources, broad network access, and the rapid and elastic scaling of resources. And it’s on the rise – particularly with corporate clients. But there’s still some confusion about its various […]