Operations | Monitoring | ITSM | DevOps | Cloud

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.

OpenTelemetry Architecture: Understanding Collectors

Telemetry data is a powerful tool for understanding the behavior of complex systems. OpenTelemetry provides a platform-agnostic, open-source way to collect, process, and store telemetry data. This post explores the OpenTelemetry collector architecture, specifically focusing on the Collectors component. We'll look at how collectors work and how they can be used to process telemetry data from any system or application. We'll also discuss some benefits of using OpenTelemetry for your telemetry needs.

Rerouting of Kherson follows familiar gameplan

Since the beginning of June this year, internet connectivity in the Russian-held Ukrainian city of Kherson has been rerouted through Crimea, the peninsula in southern Ukraine that has been occupied by Russia since March 2014. As I explain in this blog post, the rerouting of internet service in Kherson appears to parallel what took place following the Russian annexation of the Crimean peninsula.

Pre- and post-deployment testing methodologies for CI/CD

Your team has worked hard on a software product for months, and it’s finally ready to release to your users! But then the worst-case scenario happens: a wide release soon indicates that the software is plagued with bugs and performance issues, resulting in poor reviews and widespread user dissatisfaction.

Laying the foundations for a healthier digital future in the NHS

At the end of 2021, we published a blog post about the Autumn budget in the UK, what it meant for IT teams in the NHS, and why data management should be prioritised. We looked specifically at four key areas for sharing, monitoring, protecting, and accessing data that we believe are crucial elements of the digital transformation journey. Digital transformation is part of the NHS Long Term Plan, a wide-ranging programme to upgrade technology and digitally-enabled care across the NHS.

DevOps 101: The role of automation in Database DevOps

This is the fifth part in the DevOps 101 series and it’s time to talk about automation. Before we get into it, I just want to recap what DevOps is. Microsoft’s Donovan Brown sums it up nicely in a single sentence: DevOps is the union of people, process, and products to enable continuous delivery of value to our end users. The important thing to remember here is the order in which he talks: people, process, and products. That’s the way DevOps works.

Interrupts in software teams: using unplanned work to your advantage

Interrupts are often seen as a problem that eats away at your team’s productivity, and gets in the way of shipping important things for your customers. It’s often consciously accrued from the tech debt we accept to ship features sooner. However when a team doesn’t have a good strategy for dealing with the consequences of those decisions, the pain is felt much more acutely and much sooner.

The 3-2-1 Backup Rule Explained

Data disasters are practically inevitable, but a planned out backup strategy can combat their damaging effects. The Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. government is a major organization that recommends sticking to a 3-2-1 backup strategy. Follow the 3-2-1 backup rule to ensure that your data is kept safe.