Operations | Monitoring | ITSM | DevOps | Cloud

Are your applications secure? Can you find it out without complex rules?

The modernization of infrastructure and applications is driving the rapid growth of containers, and as companies scale the adoption of Kubernetes, it’s critical to incorporate security and compliance. The challenge? Compliance and security is a journey, not a state in time, and application security in Kubernetes has a large surface area. This challenge increases exponentially as you run more applications, onboard more developers, add more environments, add new pipelines, and more.

When End Users Attack: Tips for Fixing a Hostile Work Environment

Hostile work environments are a real problem in tech and can be a significant driver of IT job stress. This is particularly true for IT helpdesk and support roles. Helpdesk agents often complain of burnout and frustration related to how end-users treat them. IT service roles will never be “stress-free”. The nature of break-fix work for critical systems inherently comes with the job.

Puppet and Government: Adopting infrastructure as code

Government agencies are facing a rising need for changes to their IT infrastructure. This need is becoming even more urgent as they continue to migrate operations to the cloud. Leveraging modern cloud applications and resources within an existing legacy agency environment requires IT agility to maintain the balance of security while keeping pace with an agency’s mission.

How an integrated ITSM and ITOM platform can help you accelerate it

Accelerating the overall enterprise efficiency is not an easy task as you probably rely on multiple tools to communicate with customers, partners, employees, and vendors. There’s a chance that you’re already working with multiple software vendors to optimize your IT and network infrastructure. However, this can create chaos across your IT landscape – causing poor user experiences, disparate workflows, recurring IT issues, upgrading systems, and more.

Making the World's AWS Bills Less Daunting

Armed with a Ph.D. from UC San Diego, our guest started off with internships at Google and Microsoft before gaining valuable experience as a VP and a highly sought-after consultant for startups and SMBs. Now he’s one of the world’s foremost experts on wrangling vast data sets and maximizing efficiency.

How To Identify and Stop a Phishing Attack

Phishing is a real problem. One that can wreak havoc on your digital and financial life. Here, we’ll look at different ways we can identify a phishing scam and stop it in its tracks. Phishing is the practice of sending emails (or other messages) with the intent to make the recipient believe it’s from a certain company or individual.

Getting Started with OpenTelemetry for Observability

This article was published in The New Stack. For most developers, software development means there is an API for almost everything, hardware is provisioned via the cloud and the core focus is on building only the features most crucial to your business. Of course, all these integrations and modern distributed architectures create their own set of problems. Having full insight into your application has become even more important and is now commonly known as observability.

Cribl.Cloud: Are You Ready to Fly Solo?

Many years ago, I attained my private pilot’s license. This entailed completing a very structured program, similar to how most companies introduce a product to a new user. Let’s be honest, there is a really good reason for this – to avoid the crash and burn. With flight training, it’s literal, while with products it’s a bit more figurative (except when you YOLO something into production–that can cause a crash and burn–and leave for a bad first impression).