Tag: Blog

Home / Blog

Enhancing Cloud Reliability With Failure Simulation In AWS

Cloud consultant Asanka Nissanka looks at how to use AWS Fault Injection Simulator (FIS) for chaos testing. One of the most common misconceptions about cloud-based systems is that they are inherently reliable and don’t require failure testing. Yet under the shared responsibility model, cloud vendors are only responsible for reliability of the cloud, not workloads […]

Read More… from Enhancing Cloud Reliability With Failure Simulation In AWS

How to Get Cloud Security Off to a Strong Start in Amazon Web Services

Factors that underpin cloud security best practices are frequently overlooked during accelerated large-scale migration or adoption. The result is shaky foundations that put the organisation at risk of accidental or malicious breaches. To prevent this, security should be considered a fundamental aspect of cloud builds from the outset, not a standalone activity. In this blog, […]

Read More… from How to Get Cloud Security Off to a Strong Start in Amazon Web Services

Service Choreography for Modern Applications

Introduction On a high level, most typical applications consist of workflows that process tasks. Within each workflow are steps performing actions on the tasks. In modern applications, these steps are typically implemented as container services or serverless microservices.  If we use an analogy to help understand this, then the application would be an organisation such […]

Read More… from Service Choreography for Modern Applications

DORA Metrics: Measuring What Really Matters About Your Software Delivery

Introduction Organisations around the world want to improve the efficiency of their software development teams, delivering software at scale to their customers. When organisations want to improve the quality and efficiency of their teams, they need to determine how to measure success. Some common questions that we hear from our clients include:  How good are […]

Read More… from DORA Metrics: Measuring What Really Matters About Your Software Delivery

Data Model Wrangler: Tracking Splunk Data Model Compliance

Organisations with large Splunk deployments, especially those using Splunk Enterprise Security, understand the importance of having data sources properly mapped to the Splunk Common Information Model (CIM) data models. Poor CIM compliance yields poor security insights, as Splunk Enterprise Security utilises data model searches almost exclusively in its security use-case correlation searches.  Something that has been […]

Read More… from Data Model Wrangler: Tracking Splunk Data Model Compliance

The Singapore Budget 2022 – Implications and Opportunities in the Digital Sector

Introduction In Singapore, the national budget is shared with the public every year. It includes a revenue and expenditure report for the past financial year, covering revenue from taxes, fees and other charges. The expenditure makes transparent the operating and development cost of the Singapore Government. This report is also forward-looking, providing expectations and the […]

Read More… from The Singapore Budget 2022 – Implications and Opportunities in the Digital Sector

Crafting a Data Breach Plan for Small to Medium Organisations in Regulated Industries

Introduction 2020 was a busy year for cyber-security with 3,950 confirmed data breaches. Varonis and the Ponemon Institute calculated the global average cost of a data breach to be $3.86 million – rising to $4.24 million in 2021. It is apparent that many companies are struggling to develop sufficiently robust systems that protect from cyber-security […]

Read More… from Crafting a Data Breach Plan for Small to Medium Organisations in Regulated Industries

The Evolution of Testing in the Age of Serverless

Introduction As organisations adopt microservices for rebuilds and new applications, many will realise that the established ‘Test Pyramid’ approach to testing is considerably less effective than it was with traditional applications. The Test Pyramid emphasises unit tests that focus on the application’s individual functions and code. These comprise the bulk of this testing strategy, reflected […]

Read More… from The Evolution of Testing in the Age of Serverless

Do You Have A Good Grip On Your Data?

Background Data Governance is often on top of the Chief Data Officer’s agenda. With the advent of the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA), the China Personal Information Protection Law (CPIPL) and others, companies are taking a closer look at their data practices. Beyond the need for regulatory […]

Read More… from Do You Have A Good Grip On Your Data?

Event Storming

Event Storming is a workshop-based approach to migrating a monolithic application to a microservices architecture. It follows a series of steps to assess the monolith, discover events, and identify actors who use the system. The final step of grouping these insights will help to inform an effective event-driven microservices architecture. The rise of Microservices has […]

Read More… from Event Storming