The Defense Information Systems Agency (DISA) manages and assures a global enterprise information structure across the full spectrum of US military operations.
The foundation of effective security is knowing what you need to protect. Without a full inventory of your Internet-connected assets, you don’t have a clear picture of your attack surface. And that means you can’t identify and remediate exposures. While many organizations today may think they understand their attack surface, the truth is that they don’t because of a fundamental breakdown in asset management and governance.
Machine-speed attacks mean even brief exposures can be damaging
It has never been more important for organizations to track and monitor their full, global Internet attack surface. Recent research shows that malicious actors can find and attempt to exploit exposures that are up for only minutes. Attackers using sophisticated tools to scan the entire Internet for exposures, coupled with automated, machine-speed attacks can now more easily breach unknown or unmonitored assets, potentially bringing your entire network to a standstill.
Before you begin…
This article consists of two parts: first understanding side-effects and how they relate to Redux, and then digging into the fundamentals of Redux-Saga. Feel free to skip to the Redux-Saga section if you are purely interested on jump-starting your understanding of Redux-Saga. But if you are still uncertain about whether Redux-Saga is right for you, then the first part of this article may help you with that decision.
This post is part of a 3-part series on Expanse’s transition to a Microservices  Architecture built on Java and Spring Boot. In this series, we seek to share the issues we faced with the monolithic system, why we think the Spring Boot-based services will address them, and how we are affecting this change, with other technologists who love to design or think about systems.