2021-07-13 | By Adam Dróżdż | In Column

Mistakes to avoid when using Google Cloud

Google Cloud Platform is a suite of public cloud computing services offered by Google. The platform includes a range of hosted services for compute, storage and application development that run on Google hardware. Google Cloud Platform services can be used by software developers, cloud administrators and other enterprise IT professionals. Avoid excessive use of default service accounts and primitive roles IAM stands for identity and Access management [1] , and it allows you to manage access control by defining who (identity) has what access (role) to which resources. Cloud IAM has many…

Continue reading

2021-07-05 | By Incognito Redacted | In Cloud

What are the pros and cons of Azure native monitoring solution?

Azure [1] is a Microsoft cloud computing platform that provides everything a business might need to run a part, or all of its computing operations virtually - including servers, storage, databases, networking, analytics and more. Microsoft Azure competes with similar services from Amazon (AWS) and Google (GCP). The Azure cloud platform has more than 200 products and cloud services, designed to help you bring new solutions to life, solve today's challenges and create the future. Having so many cloud based products and services, Microsoft had to design and implement common observability…

Continue reading

2021-06-29 | By Kamil Szczygieł | In Column

What are the most common mistakes in migration to the cloud?

Cloud is often considered as a new holy grail in terms of infrastructure. It promises flexibility, cost reduction and scalability along with ease of use. These arguments, and the amount of hype the cloud is receiving often pushes companies to a radical decision - migrate everything into the cloud. However, it's worth noting, that not every infrastructure is suitable to live on a cloud. In this article, you will find most common mistakes businesses make while migrating to the cloud. Lack of detailed requirements research The requirements reseach is often treated as a basic child's math problem…

Continue reading

2021-02-05 | By Stanisław Szymański | In Security

How people hack themselves with dotgit?

In the twisted times of modern technology era it is often unsafe to assume, that you're safe. Today's topic is .git - one of the primary examples, how you can accidentaly hack yourself by an extremely simple, even trivial, overlook. We will explain, what is .git directory, how it can be used by the attacker to run away with a copy of your code, how to spot such vulnerabilities in your infrastructure, and what should be done to keep the danger away. What is .git ? .git [1] is a directory, native to Git [2] , the most popular version control system to date. Put simply, Git uses .git…

Continue reading