Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface

Threat vulnerability management, and managing your attack surface, are critical in the battle against cyberattacks. At some point before an successful attack, the internal process to manage threats and prevent access to sensitive data failed. How could they have done things differently? Were they just managing too much, too often, without the resources they needed?

Traces to metrics: Ad hoc RED metrics in Grafana Tempo with 'Aggregate by'

In observability, finding the root cause of a problem is sometimes likened to finding a needle in a haystack. Considering that the problem might be visible in only a tiny fraction of millions or billions of individual traces, the task of reviewing enough traces to find the right one is daunting and often ends in failure.

Learning by Example with Cribl's New Lookup Examples Pack

In the world of data management, Cribl offers various methods to enhance data using the Lookup Function and many C.Lookup Expressions. While Cribl’s documentation is comprehensive, practical examples are often the most effective learning tools. That’s why we’ve introduced the new Lookup Examples Pack.

Importance of Log Management in IT Security

Around 70% of companies experienced cyberattacks in the past year. With this increase in cyberattacks, the importance of log management in IT security has also increased over the years. That’s the reason why small and enterprise businesses have started to invest in log management tools to protect their businesses from cybersecurity breaches.

What is Cloud Computing? Everything you need to know about the cloud explained

Cloud Computing is a service offered by several software providers paying a rent either by the hour, month or use of said service. They can be virtual machines, databases, web services, or other cloud technologies. These services are on remote servers provided by companies such as Google, Microsoft and Amazon among others that for rental or in some cases free of charge, provide such services.

IT Support Levels: Optimizing the Support Service through Tiers 0 to 4

Information Technology (IT) support, also known as technical support, is essential for the successful and efficient operation of organizations in the digital age. It helps ensure the stability, productivity and security of your systems and those of the people who depend on them.

10 Kubernetes cost optimisation techniques for 2023/2024

These are 10 strategies for reducing Kubernetes costs. We’ve split them into pre-deployment, post-deployment and ongoing cost optimisation techniques to help people at the beginning and middle of their cloud journeys, as well as those who have fully adopted cloud and are just looking for a few extra pointers.

The art of software engineering management

Like any leadership role, leading an engineering team in a mature, compact company like Raygun comes with both honor and responsibility. Leading a major development project is a bit like conducting a symphony orchestra, where every individual plays a crucial role and has a great impact on the work they release to customers and end-users.

Technology That Will Enhance Your Business

In this rapidly progressing digital era, businesses must embrace innovative technologies to stay competitive. The right blend of technological tools streamlines operations and opens up new avenues for growth and profitability. To arm you with the knowledge necessary for businesses embracing technology, we have compiled this helpful post about some of the most impactful technological advances that will enhance your business operations.