Operations | Monitoring | ITSM | DevOps | Cloud

Threat Thursdays: 2020 A Year in Review

We can finally bid a not so fond farewell to 2020. Looking back at our Threat Thursday series in reflection there is no way other than to say 2020 was a brutal year in cybersecurity. 2019 had already driven ransomware into high gear, but the seven-figure ransom extorted from Travelex really set the tone for what was to come this year. The New Year is a time to reflect, but most importantly it’s a time to learn from the past to create a safer, more secure future.

Good Catch: Customer Experience Monitoring

As the customer experience has moved almost entirely online, finding and fixing issues before they impact your conversions, retention, and revenues has become an increasingly complex task. In this article, two real-world examples are presented from the gaming and eCommerce industry that showcase the limitations of static thresholds and the impact that has on customer experience.

MSP Security Incident Response Planning (a Quick Guide)

Every second counts when it comes to Managed Service Provider (MSP) security — the longer it takes an MSP to complete security incident response, the greater the ramifications of the incident on the service provider and its stakeholders. When faced with a cyber attack, it’s crucial to understand the potential consequences of the security incident. It also is paramount for an MSP to establish a plan, so it can quickly and effectively respond to cyber attacks and other security incidents.

13 Marketplaces to Sell or Buy a Website or a SaaS Business

Web design is creative and time-consuming at the same time. But sometimes, selling a design, a template, or a ready to use website can get challenging. It might not prove to be as much of a revenue generator as one would like, and there could be several reasons for it. For one, the justified asking price might get slightly high due to the scale of investment and time involved, and thus, buyers might move to other vendors.

5 Best practices for ensuring secure container images

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the application life cycle is a critical part of security, but many organizations don’t even follow basic best practices for ensuring secure container images.

Things You Should Know Before Choosing Application Performance Monitoring Tools

Application Performance Monitoring tool has become the most emerging business to organizations to deal with complex applications. It helps in optimizing and monitoring the performance of your application. To ensure your app's performance, since it is of utmost importance for the better user-experience, the recommended approach would be to use APM tools. There are wide spectrum of application monitoring tools available in the market place.

Challenges to Database DevOps: Dealing With Drift

Sometimes, people start their DevOps journey by getting their database into source control, but then, they don’t deploy from source control. Instead, they continue their manual deployments to production. Quickly they find that the database code in their production instances and the database code in their source control system don’t match.