Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

DevSecOps: A Modern Security Model for Digital Transformation

Developers and security experts are now tasked with bolstering, extending, and adjusting cloud and Kubernetes security to protect against cyberattacks that are ever more complex, volatile, and frequent. To foil attacks and create a secure foundation for applications and infrastructure from the beginning, DevSecOps (Development, Security, and Operations) has become the trending development and operations practice. In the DevSecOps model, security becomes a shared responsibility.

Ensure release safety with feature flag tracking in Datadog RUM

Developers and teams who want to deploy new code often and safely leverage feature flags to decouple code deployments from feature releases. Feature flags enable teams to release new features to a subset of users, making it possible to test a new feature’s impact on users and ensuring that developers can easily roll back the feature if it causes downstream issues.

Inside Story: Audit & Events Tracking Feature With Our Customer Feedback

At Qovery, we are dedicated to providing the best experience possible to our users when it comes to managing their cloud infrastructure. We believe that building features with our customers is essential to our success. That's why we worked closely with our customers to develop our new feature, Audit & Events Tracking.

Upgrading Your Rancher Downstream Clusters to Kubernetes v1.25

The PodSecurityPolicy API, initially deprecated in Kubernetes v1.21, was entirely removed in Kubernetes v1.25. Because the API was removed, you cannot create, edit or query PodSecurityPolicy resources in a Kubernetes v1.25 cluster. Also, because its admission controller was removed, your clusters can no longer enforce any PodSecurityPolicy rules that were created in Kubernetes v1.24 and prior.

Big data security foundations in five steps

We’ve all read the headlines about spectacular data breaches and other security incidents, and the impact that they have had on the victim organisations. From LastPass to SolarWinds, “data security” seems to be the phrase on the lips of every CTO these days. And in some ways there’s no place more vulnerable to attack than a big data environment like a data lake.

POS Security: How to Protect Your Android POS Systems

The adoption of POS devices across industries is advancing, fast! Businesses including restaurants, grocers, and retail stores are seeing POS devices as a multi-functional hub that offers menu creation, tableside ordering, employee management, CRM, inventory management, and more. According to statistics, 59% of retailers made focusing on omnichannel capabilities their top POS priority in 2020.

Azure Tenant: Comprehensive Guide to Managing Your Cloud Domain

When it comes to the world of cloud computing, Microsoft Azure is one of the top players in the game. However, managing an Azure environment can be complex and requires a good understanding of its various components. One such component is an Azure tenant. An Azure tenant, also referred to as a directory or a subscription, is essentially a dedicated and isolated instance of the Microsoft Cloud that holds your organization’s data and accounts.