Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Potential causes of a collaboration platform data breach

Data is the lifeblood of modern organizations. Since data helps teams make better decisions and provide a competitive edge, it’s also a target of bad actors looking to steal sensitive information or launch ransomware attacks. From software vulnerabilities and weak authentication mechanisms to malware and inadequate access controls, there’s no shortage of ways for hackers to infiltrate networks and gain access to mission-critical data.

Go fixes its 7th code execution bug in the same feature

If there’s one Go programming language feature that just doesn’t seem to catch a break when it comes to security, it’s the CFLAGS and LDFLAGS handling in cgo. This is a feature that lets parts of Go source code control the compiler and linker flags that are used to build that same code.

Transforming Kubernetes into an Internal Developer Platform in 10 Minutes

An Internal Developer Platform (IDP) is a powerful tool for providing self-service infrastructure for developers. It allows developers to manage application lifecycles without the constant need for IT team involvement, streamlining the process from development to production. With its widespread adoption, Kubernetes has become the standard for running application workloads across various organizations.

What Is Snowflake? A Beginner-Friendly Guide

Imagine if you had a magic box where you could keep all your business information — sales numbers, customer feedback, everything — safe and sound, but also easy to look at whenever you needed. That’s kind of what Snowflake does, but for big organizations and using the cloud. It’s a new way for companies to store and use their data without getting bogged down by the techy details.

Strengthen Your Security in the Cloud: Privacy and Data Security

Managing security in the cloud and throughout hybrid environments is a challenge with high stakes — customer data, sensitive information, access privileges, and other cloud-based assets are all at risk when an organization uses the cloud. Let’s explore some common cloud-based security concerns and learn how to keep your cloud environment secure.

The relationship between cloud FinOps and Security - Expert tips

In this episode, we delve into the relationship between Azure Cost Management and security in cloud computing with FinOps certified practitioner Michael Stephenson and Microsoft MVP for Security Nino Crudele. Learn how security measures impact cloud costs and explore strategies for balancing robust security with cost-effectiveness. Discover the crucial role of governance, policy enforcement, and FinOps in optimizing both cost and security postures.

What Can a Service Mesh Do for Your Kubernetes Environment? with Tony Pope-Cruz

Explore the essentials of Kubernetes management with Tony Pope-Cruz from @dynatrace in this detailed walkthrough. Understand how to avoid common pitfalls in Kubernetes deployments, such as mismanagement of resources that can lead to significant outages. Gain insights into how service meshes provide robust solutions for traffic management, service reliability, and observability.

Three roles you need for reliability success

It’s one thing to say that reliability is a priority for your organization, and a whole other thing to make actual, demonstrable improvements in the availability of your applications. Sadly, it’s common for organizations to invest time, money, and effort into improving reliability only to barely nudge the needle on incidents and downtime. But there are hundreds of companies successfully improving their reliability posture—and doing it at enterprise scale.

Manage incidents seamlessly with the Datadog Slack integration

Modern, distributed application architectures pose particular challenges when it comes to coordinating incident management. DevOps, SREs, and security teams—often spread out across separate locations and time zones, and equipped with limited knowledge of each other’s services—must work quickly to collaboratively triage, troubleshoot, and mitigate customer impact.