Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The Role of Open Architecture in Creating a Unified Security Platform

In the evolving digital security landscape, the significance of an adaptable and robust system cannot be overstated. Open architecture plays a pivotal role in developing these unified security platforms, offering a versatile and efficient solution to the diverse needs of businesses. This blog post delves into the various aspects of open architecture and its impact on creating a unified security platform.

The Three Ways of DevOps Governance

In this blog post, I take a look at modern IT governance by applying the classic “Three Ways” of DevOps principles originally introduced by Gene Kim in his seminal 2012 article. “We assert that the Three Ways describe the values and philosophies that frame the processes, procedures, practices of DevOps, as well as the prescriptive steps.” Here’s a quick reminder of the three ways set out by Gene: For Gene, all DevOps patterns can be derived from these three principles.

Navigating the Global Cybersecurity Talent Shortage

In an age where technology is central to most of our lives, data security is more important than ever. As we produce ever more data, consumers and organizations become more vulnerable to cyberattack; the demand for cybersecurity talent has increased accordingly, leaving a talent gap within the industry.

Data Overload: Why Companies Collect Too Much Data and Pay the Price

In the US, a recurring news topic is the state of the federal budget – and if we’ll get one signed. Government budgets have hundreds of thousands of line items; each bickered over to gain or lose political capital with one group or another. However, most government budgets aren’t up for debate. Only about 30% of the US federal budget is discretionary or flexible. Nearly two-thirds, or 63%, is mandatory spending required due to prior commitments.

How to Detect Unauthorized Changes in Production with Kosli

Let’s not beat around the bush: change management is a prehistoric discipline desperately in need of fresh thinking. Its “best practices” are frankly terrible. Nobody honestly thinks manually filling out change tickets, waiting for CAB meetings and external approvals does anything to meaningly reduce risk. Change management is slow, inconsistent, doesn’t scale, and is prone to error.

How To Choose The Right Internet Provider For Your Business

It is crucial to choose the correct internet provider for your organization in this day and age where all corporate operations are digitally mediated. Whether you're a burgeoning startup or an established corporation, a seamless and robust internet connection is the backbone of your daily operations. However, with a plethora of options available, finding the perfect fit for your business can be a daunting task. Fear not, as we delve into the intricacies of this crucial decision-making process, offering insights and considerations to ensure you make an informed choice for your unique needs.

What is a Kubernetes cluster mesh and what are the benefits?

Kubernetes is an excellent solution for building a flexible and scalable infrastructure to run dynamic workloads. However, as our cluster expands, we might face the inevitable situation of scaling and managing multiple clusters concurrently. This notion can introduce a lot of complexity for our day-to-day workload maintenance and adds difficulty to keep all our policies and services up to date in all environments.

A Look at How the Cloud Has Streamlined Financial Management

In modern business, the role of technology has become increasingly pivotal, revolutionizing the way organizations operate and manage their resources. One of the most transformative technological advancements in recent years has been the widespread adoption of cloud computing. The cloud has not only altered the way businesses store and access data but has also significantly streamlined various aspects of financial management. This article delves into the multifaceted ways in which the cloud has reshaped financial management, making processes more efficient, cost-effective, and flexible.

Backstage Developer Portal

Backstage, a development portal, allows developers to maintain constant vigilance over the health of their networks and services, no matter where they are deployed. This is invaluable to teams, as many different deployments across different environments need to be monitored to ensure security and compliance. Find out how to evaluate, implement, and succeed with Backstage in order to maintain your security perimeter and ensure that all deployments are working as intended.

How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface

Threat vulnerability management, and managing your attack surface, are critical in the battle against cyberattacks. At some point before an successful attack, the internal process to manage threats and prevent access to sensitive data failed. How could they have done things differently? Were they just managing too much, too often, without the resources they needed?