Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Building a culture of incident response

At Vanta, our goal is to nurture a positive security culture in everything we do—which is especially critical given that helping our customers improve their security and compliance posture starts with our own. Employees are the key to our security resilience, so we strive to build and support a strong culture of incident response in tandem. Here’s what that means to us at Vanta.

How to deploy the Datadog Agent on Windows with Ansible

When your organization relies on hundreds or thousands of hosts, it can be difficult to ensure that each is equipped with the proper tools and configurations. Configuration management tools like Ansible are designed to help you automatically deploy, manage, and configure hosts across your on-prem and cloud infrastructure. In this post, we’ll show you how to use Ansible to automate the installation of the Datadog Agent on a dynamic inventory of Windows hosts.

Maximizing Password Security: A Guide for IT Professionals on World Password Day

With every new device, application and website that your users and employees have to log in to, they have to create a new password. It’s no wonder then that they find this overwhelming. So, what do they do? They create a password that is easy to remember — something like “123456” or perhaps their birth date. Then, to keep it simple, they use the same password over and over again. On top of that, they opt for their browsers and devices to remember these passwords.

Migrating Graphite to the Cloud

Are you ready to take your monitoring and analysis game to the next level? As businesses increasingly shift to the cloud, migrating Graphite metrics to the cloud has become critical to unlocking the full potential of real-time performance monitoring. In this article, we'll guide you through migrating Graphite to the cloud and show you how to make the transition as smooth as possible. So grab a cup of coffee, and let's dive in!

Redgate opens the doors to cross-database DevOps Test Data Management

A constant challenge for many development teams is how to include test data management in the development process. Testing with consistent, realistic and compliant datasets, and bringing the database into CI and DevOps pipelines, has been shown to catch data-related issues long before they reach customers. The result: an increase in efficiency, a reduction in costs, and an improvement in the quality of software releases, enabling value to be released to customers faster.

The 5 Biggest Enterprise Threats to Your Mobile Security and How to Prevent Them

The 5 Biggest Threats: You may have found your business is relying on mobile devices more and more. The computing power of phones and tablets can now equal that of your average desktop computer, but their portability makes them far more useful in a remote working environment. With the number of online communications options available to mobile devices, making a call on a mobile phone is almost an afterthought – but with a cloud business phone system, it is an option that is supported.

Is your incident management solution creating more problems than it solves?

When it comes to incident response, the ability to adapt and customize your approach is key. Every organization has unique needs and workflows, and a one-size-fits-all solution simply won't cut it. That's why Blameless is proud to offer a flexible platform that allows teams to tailor their incident response process to fit their exact requirements.

Top Trends in DevOps - Low-Code Applications

The world of DevOps is constantly evolving and adapting to the needs of the software development industry. With the increasing demand for faster and more efficient software delivery, organizations are turning to modern technologies and practices to help them meet these challenges. In this series of articles on the Kublr blog, we will look at some of today’s top DevOps trends.

The why and how behind running incident response game days

In any high pressure situation, the key to fast action is preparedness. And that’s true when it comes to incidents, too. Documenting and training your team on your incident response processes is essential to ensuring a coordinated and efficient response effort. And training sessions, or game days, as they’re sometimes called, are one way to get everyone up to speed.

How to setup Azure Key Vault

Microsoft Azure Key Vault is a cloud-based service designed to help organizations securely store and manage sensitive information such as encryption keys, secrets, and certificates. As more organizations migrate to cloud services, ensuring the security of sensitive data and applications is crucial. In this comprehensive guide, we will discuss Azure Key Vault with a focus on securing Blob Storage, providing how-to guides and best practices.