Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How to conduct a vulnerability assessment

The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters further, some of these terms are used interchangeably or in contexts outside of computing. This can muddy the waters for people looking to learn about vulnerability assessments – so in this blog we’ll begin by demystifying the language, before delving into how you can perform vulnerability assessments on Ubuntu installations.

5G without compromise: Building mission-critical private networks for Industry 4.0 with open source

Enterprises across industry verticals are looking for new ways to increase the efficacy of their businesses. One way to do this is building an efficient pipeline of processes, employees, devices, and services that are all tightly integrated to get the best return on investment. However, this requires an efficient telecommunication system where industry machines, personnel, and business services use continuous, performant, and reliable communications to work together.

Valkey container image - securely designed, compliant, and long term supported (LTS)

Valkey is a new database management system that is gaining traction. Valkey is a fork of Redis, and it is available as a deb package in the Ubuntu 24.04 release. You can install it by simply running sudo apt install valkey. We also offer a Valkey container to allow you to run a secure, compliant and long-term supported Valkey on top of any Linux distribution.

How Ubuntu Pro + Support keeps your Ubuntu 20.04 LTS secure and stable

Whether you plan to continue running Ubuntu 20.04 LTS or upgrade to the latest LTS, keeping your infrastructure secure and stable is a top priority. Extended Security Maintenance (ESM) provides essential security updates to protect your systems from vulnerabilities, ensuring you stay compliant and up to date against the latest threats.

7 considerations when building your ML architecture

As the number of organizations moving their ML projects to production is growing, the need to build reliable, scalable architecture has become a more pressing concern. According to BCG (Boston Consulting Group), only 6% of organizations are investing in upskilling their workforce in AI skills. For any organization seeking to reach AI maturity, this skills gap is likely to cause disruption.

AI in 2025: is it an agentic year?

2024 was the GenAI year. With new and more performant LLMs and a higher number of projects rolled out to production, adoption of GenAI doubled compared to the previous year (source: Gartner). In the same report, organizations answered that they are using AI in more than one part of their business, with 65% of respondents mentioning they use GenAI in one function.

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for your opponent. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn.

Canonical achieves ISO 21434 certification, strengthening automotive cybersecurity standards

Canonical is proud to announce it has achieved the ISO 21434 certification for its Security Management System, following an extensive assessment by TÜV SÜD, a globally respected certification provider. This milestone highlights Canonical’s leadership in providing trusted and reliable open source solutions for the automotive sector.

Ubuntu available in Microsoft's new WSL distribution format

We are happy to announce that Ubuntu on Windows Subsystem for Linux (WSL) is now available in Microsoft’s new tar-based distribution architecture. Ubuntu has been a widely used Linux distribution on WSL, offering a familiar development environment for many users. This new distribution architecture for WSL will make adoption easier in enterprise environments by enabling image customization and deployments at scale.

The role of FIPS 140-3 in the latest FedRAMP guidance

There’s good news in the US federal compliance space. The latest FedRAMP policy on the use of cryptographic modules relaxes some of the past restrictions that prevented organizations from applying critical security updates. There has long been a tension between the requirements for strictly certified FIPS crypto modules and the need to keep software patched and up to date with the latest security vulnerability fixes.