Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Cycle Podcast | EP 14 | Derek Distenfield | Introducing GSD.dev: Connect Startups w/ DevOps Teams

In this episode, Jake Warner chats with Derek Distenfield, co-founder of GSD Venture Studios. From an introduction to GSD’s Venture Studio and Global Accelerator to a big announcement about a new partnership with Cycle, Jake and Derek dive into the world of building startups -- without suffering from the lack of DevOps experience.

New Active Directory Integration features in Ubuntu 22.04 (part 4) - Scripts execution

In this article we will focus on how you can use Active Directory to schedule startup, shutdown, login or logout scripts on your managed desktops through ADsys. In this area, as well as for all the other new features delivered by ADsys, we tried to offer a user experience as close as possible to the native one available in Microsoft Windows, with the aim of enabling IT admins to reuse the same knowledge and tools they acquired over the years to manage Ubuntu desktops.

Announcing Cycle.io's Partnership with GSD Venture Studios

We've made it our mission to reduce technical debt in the future of cloud computing, and our partners are helping us make that mission a reality. Today, we’re excited to announce that one of the world's leading Venture Studios, GSD Venture Studios, has chosen Cycle.io as the underlying platform for their new on-demand DevOps service, GSD.dev.

Software supply chain: What it is and how to keep it secure

As shortages of consumer goods and rising prices caused by bottlenecks in international supply networks have become more common, the global supply chain and its vulnerabilities have been top of mind for many. For developers, several high-profile software security exploits have recently underscored the risks inherent in a similar type of supplier network: the software supply chain.

Trusted SBOMs delivered with the JFrog Platform and Azure

SBOMs provide essential visibility into all the components that make up a piece of software and detail how it was put together. With an SBOM in hand it’s possible to determine if software contains existing security and compliance issues or is impacted by newly discovered vulnerabilities. The SBOM is imperative due to the White House’s cybersecurity executive order from May 2021 requiring them for all government software purchases and many private organizations following suit.

Prevent XSS attacks with browser testing

Security is a never-ending battle on the web. You can have a server up in just a few minutes, and the next minute, someone is already trying to hack into it. These attacks could be automated using malicious bots or launched manually. Websites can be targeted by a malicious user trying to compromise your web presence or data. Cross-site scripting (XSS) is just one type of attack your site may be vulnerable to.