Our internal incident response documentation is something we’ve built up over the last few years as we’ve learned from our mistakes. It details the best practices of our process, from how to prepare new employees for on-call responsibilities, to how to handle major incidents, both in preparation and after-work. Few companies seem to talk about their internal processes for dealing with major incidents. It’s sometimes considered taboo to even mention the word “incident” in any sort of communication. We would like to change that.
To that end, we’d like to share how we here at PagerDuty conduct post-mortems internally. It is our hope that others will use the documentation as a starting point to formalize their own processes. This guide provides information on what to do after a major incident and shares PagerDuty’s follow-up and after-action review procedures.View Whitepaper
Though the scale and economics of the cloud are a boon for today’s enterprise, moving applications and data out of the data center into multi-cloud environments has greatly expanded threat surfaces, putting enterprises at greater risk of devastating ransomware attacks. This report will explore how to move beyond segmentation inside the data center and traditional next-gen firewalls at the perimeter and build a defense that meets the special demands of a multi-cloud environment. ...
90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks.
Based on research conducted by the VMware Threat Analysis Unit, this report uncovers the unique characteristics of remote access tools (RATs), ransomware, and cryptominers on Linux-based systems and how you can mitigate these threats. You will learn more about:
Existing characterization tech ...
Organizations can no longer rely on edge firewalls alone to provide network security. Once attackers get past an edge firewall, they can move laterally to high-value assets. This book illustrates how internal firewalls can help your organization secure east-west network traffic and prevent attackers’ lateral movements.
In the Internal Firewalls for Dummies Guide, you’ll learn:
The different types of network traffic and the firewall types that protect them
How distributed internal firewalls combine the best of hardware-based enterprise e ...
AWS (Amazon Web Services) offers the best price performance for virtually any application because we allow you to stretch your budget further with the broadest and deepest portfolio of infrastructure services in the cloud. Increased performance optimizes costs, empowers your development team, and delivers greater net business value for your infrastructure spend.
Read the eBook to learn more about our services, flexible purchase models, and cost-optimization capabilities. ...
More businesses are discovering the power of cloud-based infrastructure to drive innovation, run application applications at scale, reduce costs, and deliver high-quality user experiences.
In this eBook, you’ll learn how AWS (Amazon Web Services) helps customers:
Optimize price performance
Increase agility and reliability
Meet core security and compliance requirements
Focus on innovation, not IT
With the broadest and deepest portfolio of infrastructure services and the largest footprint of any cloud provider, AWS (Amazon Web Services) ...
Cybersecurity organizations have their work cut out for them. As the last line of defense in the...