Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

The guide to cloud storage security for public sector

Cloud storage solutions can provide public sector organisations with a high degree of flexibility when it comes to their storage needs, either public cloud based, or in their own private clouds. In our previous blog post we looked at the economic differences between these two approaches. In this blog we will explore some of the security best practices when using cloud storage, so that you can ensure that sensitive data remains securely stored and compliance objectives are met.

Cribl's Blueprint for Secure Software Development

Cribl is a customer first company. Building high value, secure-by-design software for security and IT teams has been by far the most gratifying experience of my professional career. As a security professional that deeply believes in Cribl’s product and mission, I share the excitement of changing forever how our customers operate and enabling them to protect their organizations; working at Cribl has been my greatest calling.

Grafana Cloud updates: Kubernetes Monitoring enhancements, browser tests in Grafana Cloud k6, and more

We consistently roll out helpful updates and fun features in Grafana Cloud, our fully managed observability platform powered by the open source Grafana LGTM Stack (Loki for logs, Grafana for visualization, Tempo for traces, and Mimir for metrics). In case you missed it, here’s a roundup of the latest and greatest updates for Grafana Cloud this month. You can also read about all the features we add to Grafana Cloud in our What’s New in Grafana Cloud documentation.

Guide to On-Premise Software: Pros, Cons, and Best Practices

One critical decision businesses face today n is whether to choose on-premise software or a cloud-based solution. On-premise software, which is installed and run on your own hardware infrastructure, provides a level of control and customization that many businesses find essential. However, it's important to weigh this against the potential costs and maintenance demands.

Embark on the Observability Journey

With the advent of byte code instrumentation (BCI) in 2008, application performance management took a giant leap in what is known as "inside-out monitoring," that is, monitoring from inside the application. Before that, application monitoring was largely limited to tracking CPU, memory, disk, and process availability. BCI offered new opportunities in terms of how applications could be monitored and what could be monitored from an application performance perspective.

Observability as Code Explained: Benefits & How to Get Started

Traditional monitoring has become insufficient for managing complex systems. Modern infrastructures consist of numerous interconnected services, and simply monitoring individual metrics and logs fails to provide a comprehensive view. This is where observability becomes crucial.

3 Ways AIOps Addresses Key Barriers to Streamlined Government IT Operations

IT modernization is imperative to an agile, productive, citizen-centric, and cost-efficient government. It’s also codified as a key objective of many mandates and guidelines. But as mission-critical as IT modernization initiatives are, they are also fraught with risk and operational challenges, including: To overcome these barriers to streamlined IT operations, government leaders should rely on artificial intelligence for IT operations (AIOps).

Testing for expiring TLS and SSL certificates using Gremlin

Encryption is a fundamental part of nearly every modern application, whether you’re storing data, sending data to customers, or sharing data between backend services. Most organizations have a data encryption strategy, and nearly every web page is using HTTPS, thanks to initiatives like Let’s Encrypt. But setting up encryption isn’t a one-time initiative. Over time, the certificates backing modern encryption expire and need to be replaced.

Why you need to prepare your network for the rise of generative AI

The evolution of generative AI is beginning to rapidly transform the way that we work and communicate. This is only set to increase as generative AI excels in providing business value by driving innovation and making intelligent decisions at unprecedented speeds. However, to fully harness its potential, organisations must ensure that they deploy this revolutionary technology safely, securely and responsibly with the right network connectivity.