Operations | Monitoring | ITSM | DevOps | Cloud

Protecting Against the Unpatched Kubernetes Vulnerability (CVE-2020-8554)

CVE-2020-8554 is a vulnerability that allows Kubernetes Services to intercept cluster traffic to any IP address. Users who can manage services can exploit the vulnerability to carry out man-in-the-middle (MITM) attacks against pods and nodes in the cluster. All Kubernetes versions including the latest release (v1.20) are vulnerable to this attack. If your cluster is multi-tenant, or allows unprivileged users to create and update services, you are impacted.

Monitoring Microsoft 365 User Experience using Microsoft Graph

Microsoft Graph has evolved to the API for Microsoft 365. Developers can’t get around it anymore. At NiCE, we have put the Graph API to work and want to share some of the learnings and highlights. Our core use case evolves around synthetic monitoring for M365 services like Teams, SharePoint Online, OneDrive, Exchange, and others. In this session, you will learn about the Graph API’s architecture and value in standard monitoring scenarios.