Operations | Monitoring | ITSM | DevOps | Cloud

Automated Threat Intelligence Enrichment: An Overview

Discovering security threats is good and well. But, in many cases, simply knowing that a threat may exist is not enough. Instead, you also need threat intelligence enrichment. Threat enrichment plays a critical role in helping to evaluate and contextualize threats, root out false positives and gain the insights necessary to mitigate risks as efficiently and quickly as possible.

What is Real User Monitoring (RUM)? Detailed Guide with Use Cases and Benefits

Near-instantaneous performance. Silky smooth user experience. This is what your digital users are expecting from your web application. If they perceive slowness or encounter failures in their user experience, they will readily switch to a competitor. Failures are a fact of life. The SRE (site reliability engineering) movement is helping craft modern digital systems that are engineered for resilience to failures.

Bloated software: The real killjoy of modern workplace technology

Bloatware, or as we affectionately call it, junkware, has always been a problem for businesses across the globe. These unused and hidden programs that never see the light of day on our smartphones and laptops and yet take up all the space and cripple the performance of the devices are costing businesses billions of dollars every year.

Uptime.com's Guide to Weathering Outage Season

It’s already been a stormy quarter with notable outages exceeding 240 hours. This spring saw two substantial cloud provider outages between Atlassian’s 9 day outage and shorter outages with CloudFlare. As reliance on cloud-based tools and services increases you should be asking, what are the best ways to monitor your site and make sure the data you’re reporting accurately reflects your site’s downtime and SLAs?

Kubernetes on the Edge: Getting Started with KubeEdge and Kubernetes for Edge Computing

Developers are always trying to improve the reliability and performance of their software, while at the same time reducing their own costs when possible. One way to accomplish this is edge computing and it’s gaining rapid adoption across industries. According to Gartner, only 10% of data today is being created and processed outside of traditional data centers.

What Is a Secure SDLC?

The Software Development Lifecycle (SDLC) framework defines the entire process required to plan, design, build, release, maintain and update software applications, including the final stages of replacing and decommissioning an application when needed. A Secure SDLC (SSDC) builds on this process, integrating security at all stages of the lifecycle. When migrating to DevSecOps (collaboration between Development, Security, and Operations teams), teams typically implement an SSDLC.

Processes, forks and executions - part 1

While working on the integration of CFEngine Build into Mission Portal we came to the point where we needed to start executing separate tools from our recently added daemon - cf-reactor. Although it may seem like nothing special, knowing a bit about the process creation and program execution specifics (and having to fight some really hard to solve bugs in the past) we spent a lot of time and effort on this step.

Asset Lifecycle: Definition & Key Stages in 2023

Revenue is a term indispensable in corporate talk. As it’s the largest number on the profit and loss statement for the company, revenue is frequently referred to as “the top line.” And business owners and managers are very attentive to this statistic. Businesses in all asset-intensive industries, particularly the power and utility sectors, are under increasing pressure to deliver better customer service, improve equipment uptime, and advance performance predictability.

Ask Miss O11y: My Manager Won't Let Me Spend Any Time Instrumenting My Code

My organization doesn’t want me spending time on instrumenting my product. What can I do? Thanks for the question! You’ll be relieved to hear that you’re in the majority, and also that there are quick (and easy) steps you can do to prove that instrumenting your code is worthwhile.

Announcing CloudZero AnyCost: Cost Intelligence For A Multi-Service World

At CloudZero, we’re confident that we can organize cloud spend better than anyone else out there. For years, we’ve helped companies to efficiently organize spend, while overcoming traditional hurdles to visibility, like shared cost, incomplete tagging, and Kubernetes. We’ve helped customers who have struggled to attribute spend to do so in a matter of days — without saddling engineering teams with new projects or embarking on a resource tagging expedition with no end in sight.