Using AWS Config Rules to Manage Resource Tag Compliance
Amazon Web Services (AWS) introduced AWS Config in 2014 to help users of their services track changes to the configuration of EC2 instances ..
Common AWS Security Threats and How to Mitigate Them
AWS security best practices are crucial in an age when AWS dominates the cloud computing market. Although moving workloads to the cloud ..
Configuring Your ELB Health Check For Better Health Monitoring
Configuring health checks for the AWS Elastic Load Balancer (ELB) is an important step to ensure that your cloud applications run smoothly. ..
Graphite Monitoring for Windows Performance Metrics
For several years now, the tool of choice for collecting performance metrics in a Linux environment has been Graphite. While it is true ..
DevSecOps and Log Analysis: Improving Application Security
As time goes on, more and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient ..
What is Blockchain, Anyway? And What Are the Biggest Use Cases?
Everyone’s talking about blockchain these days. In fact, there is so much hype about blockchains — and there are so many grand ideas ..
Resolving Issues with Your Application Using IIS Logs
If you are like most software developers, your code often doesn’t work the first time you write and test it—and a good portion of your ..