Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Common DevOps Roles and Responsibilities

DevOps-oriented engineers live at the intersection of IT operations and software development: understanding much of what it takes to maintain IT infrastructure while also being able to write code and deploy new services. DevOps-minded teams not only create services — they also maintain them. A DevOps structure forces teams to take accountability for their applications and infrastructure instead of allowing developers to throw code over the proverbial wall to IT operations.

Configure an Inbound Integration with Datadog | Moogsoft Product Videos & How-Tos

Integrating with Datadog has never been easier! In this video, you will learn how to create an API key and application key in Datadog, create user credentials in Moogsoft, and configure data types and filters in the Datadog integration. Don't forget to subscribe for content on DevOps, Observability, AIOps and more!

Trusted SBOMs delivered with the JFrog Platform and Azure

SBOMs provide essential visibility into all the components that make up a piece of software and detail how it was put together. With an SBOM in hand it’s possible to determine if software contains existing security and compliance issues or is impacted by newly discovered vulnerabilities. The SBOM is imperative due to the White House’s cybersecurity executive order from May 2021 requiring them for all government software purchases and many private organizations following suit.

Prevent XSS attacks with browser testing

Security is a never-ending battle on the web. You can have a server up in just a few minutes, and the next minute, someone is already trying to hack into it. These attacks could be automated using malicious bots or launched manually. Websites can be targeted by a malicious user trying to compromise your web presence or data. Cross-site scripting (XSS) is just one type of attack your site may be vulnerable to.

Defying the Odds: Building Robust & Safe Workloads with Aqua Security & Komodor

As Kubernetes continues to become the de-facto operating system for modern applications, the two most concerning and imminent barriers to wider adoption in production still remain security and reliability. Funny enough, they are very closely related and often affect each other. Both require careful planning in advance and a preemptive approach with robust tooling and processes in place. Both are critical to business goals, as well as to end-user happiness. And with both, when things go awry, visibility and change intelligence are essential to solving incidents.