Do You Talk About Things Like…

DevSecOps, AI/ML Ops, cloud automation, IaC, CI/CD, pet-grooming for developers, SOAR, Kubernetes, Salt Project, making the perfect whiskey sour, cybersecurity automation, and software engineering?

Yes. And a whole lot more.

EITR Technologies EITR Technologies

Salt vs Grlx: The Battle of Automation Is Getting Spicy

Author: Keisha Thomas-Gamble

In the ever-evolving world of DevOps, choosing the perfect blend of tools for automating infrastructure and application management is crucial, but also a daunting task. Today, we'll pit two contenders against each other: the up-and-coming Grlx and the established player, Salt.

Read More
EITR Technologies EITR Technologies

Grlx: DevOps Gets Another Flavorful Approach

Author: Keisha Thomas-Gamble

Grlx (pronounced "garlic") dubbed as a fleet configuration management system, brings a new aroma to the world of automation, crafted entirely in Go. This flavorful tool aims to automate system management tasks across designated nodes, aptly referred to as "Sprouts," ensuring these nodes maintain a harmonious state as defined by their "Recipes."

Read More
EITR Technologies EITR Technologies

Simplifying EKS Cluster Management with Slack Notifications

Author: Meghann Cunningham

In today's cloud-native landscape, managing Kubernetes clusters efficiently is paramount for ensuring smooth operations. Amazon Elastic Kubernetes Service (EKS) simplifies Kubernetes management on AWS, but staying on top of updates and changes can be challenging. In this blog post, we'll introduce a handy tool that automates the process of checking EKS cluster add-ons for updates and sends notifications directly to Slack, keeping your team informed and your cluster up to date.

Read More
EITR Technologies EITR Technologies

Leveraging Threat Intelligence Databases

Are you taking advantage of the powerful data available in threat intelligence databases as part of your overall defense strategy? If not, read on to find out how they can help keep you ahead of bad actors.

Read More
EITR Technologies EITR Technologies

Things I Wish I Knew Before I Started WFH

Author: Keisha Gamble

It brings wonderful images of sweatpants and fuzzy slippers, rolling out of bed and immediately being in the "office" without having to worry about what you are going to wear and packing lunches. Today, we have seen a multitude of stressors that have forced us to reshape the way we think and approach our day to day. As work-life balance and safety concerns are at the forefront of everyone's minds (rightfully so), telework opportunities have gone up, but in its wake is an undertone that is just now reaching the surface.

Read More
EITR Technologies EITR Technologies

Navigating the Broadcom-VMware Shake-Up: What You Need to Know

Author: Meghann Cunningham

In a seismic shift in the IT industry, Broadcom's acquisition of VMware has triggered a wave of transformations in its partner programs, leaving countless customers and service providers seeking clarity and alternatives.

Read More
EITR Technologies EITR Technologies

Switching Gears: My Rewarding Journey from Network Security to DevOps

Author: Jonathan Gordon

Venturing from Network Security to DevOps, my career shift was more than just a change in job titles. Join me as I reflect on the challenges and learnings that shaped this rewarding journey, blending security expertise with the dynamic world of DevOps.

Read More
EITR Technologies EITR Technologies

Exploring the Fluidity of FlowPipe

Author: Nicholas M. Hughes

Recently, I stumbled upon a fascinating tool that's been buzzing in the developer community: Flowpipe (flowpipe.io). This innovative platform caught my attention as a unique way to script complex workflows, especially for those who are familiar with Terraform but might not be hardcore coders.

Read More
Cybersecurity Automation Guest User Cybersecurity Automation Guest User

Web Retriever: The New Hero in your Cybersecurity Arsenal

Author: Nicholas M. Hughes

In the realm of cybersecurity and technology, where the Internet is both the battlefield and the prize, a new champion has emerged from the shadows of security automation tools. Meet Web Retriever, an open-source API from Hopr and EITR, that acts as a guardian of the gateway between machine workloads and the vast, chaotic realms of the Internet.

Read More
Cybersecurity Automation Guest User Cybersecurity Automation Guest User

Unlocking Efficiency: 10 Automation Projects to Transform Your Operations

Author: Nicholas M. Hughes

Does your organization need to do more with less? Who doesn’t? IT budgets are facing cuts and staffing levels are often lower than many industry professionals believe is necessary to fulfill their mission. So what can you do to get the job done with fewer people and less money? Automate All the Things.

Read More

Bridging the Cybersecurity Skills Gap: The Untapped Potential of Upskilling

Author: Nicholas M. Hughes

In the bustling realm of cybersecurity, a peculiar paradox has emerged. On one side of the chasm, there's a palpable shortage of seasoned professionals; on the other, a brigade of eager novices is ready to dive into the digital trenches, albeit sans experience.

Read More
Videos Guest User Videos Guest User

Video: Code Writeability - Over or Under Rated

When it comes to code, which rules supreme: simplicity or flexibility?

Welcome back to Rated, where we dissect whether technology, tech platforms, or software tools are overrated or underrated. This week, we're diving into the realm of code readability. Join us as our CEO Nicholas Hughes and Go expert Jonathan Hall enter the ring!🥊

Read More