This person will partner with an account executive on owning the technical sales strategy and execution for enterprise opportunities, demonstrating to customers the power and value of Chronosphere, and guiding their monitoring and observability solutions. This week we’re highlighting their Senior Sales Engineer opening. If you’ve got an interesting job for this newsletter’s eminently employable subscribers, get in touch!Ĭhronosphere - which provides cloud-native monitoring that SCALES and gives you back control to keep cost and data growth reasonable - is hiring like crazy. The JEDI contract protest simply will not die. MongoDB.Ī brute force vector was closed against PasAWS Cognito’s password reset codes. The Last Week in AWS blog now has a comparison between DynamoDB vs. The Duckbill Group (hey that’s us!) put out a AWS Cost Allocation Guide: Identifying Your Costs. He’s entirely too kind of a person.Īnother AWS employee resigns, citing their employment leave policies. Redmonk’s James Governor talks about how Spotify manages cloud cost via Backstage. This sample version helps.Ī demo on using the new tooling AWS unveiled a week or two ago to build least privilege access policies. I’m consistently annoyed by just how much boilerplate / undifferentiated work it takes to build out a CI/CD pipeline using AWS CodePipeline. Replit built their own database infrastructure.Ī guide to AWS cost control from a Corey who isn’t me feels deeply unholy. AT&T rebadges everyone’s phones to say 6G and calls it a day.Ī dive into what you should consider with respect to AWS Lambda performance optimization. Sponsoredĭish partners with AWS for its cloud-based 5G network. So check out The Threat Hunter’s Handbook from ChaosSearch and get a blueprint for identifying the clues in your log data that will stop cybercriminals in their tracks. To learn more, Download The Threat Hunter’s Handbook from ChaosSearch, an amazing guide that covers: the 6 common stages of a sophisticated attack how to adopt the mindset of an attacker how to find the hidden clues of an attack in your log data how to conduct a hunt using standard log analytics tools and a detailed real-world example of combatting an advanced persistent threat. And here’s the good news: you can significantly improve your Threat Hunting game with existing staff & analytics tools (including the popular Open Distro Kibana). With cyberattacks becoming more frequent and sophisticated, proactive Threat Hunting is increasingly critical. I’ve been puttering around with it a bit–and it shows promise. The launch of Nimble Studio is an interesting direction for AWS to go in.
0 Comments
Leave a Reply. |