Operations | Monitoring | ITSM | DevOps | Cloud

A Small Leak Can Sink a Great Ship

Small and slow leaks sink ships – by analogy, slow and small leaks can also cause significant losses for any business if not detected and fixed early. Are small leaks interesting? Suppose an eCommerce business sees a decline of 50% of purchases in the last day – the entire company would be called in – from the CEO all the way to R&D, Support, to figure why it happened as quickly as possible.

Real User Monitoring (RUM) vs. Synthetic Monitoring Comparison

When you spend a long time building an app or website just to have users complain about latency issues, it sucks. You don’t know where the problem lies, nor do you know the environment in which it occurred. So it gets ignored, and performance issues keep lingering. This not only wreaks havoc on the end users, but your bottom line suffers as well.

Simple mind

Simple mind. Thinks anytime, anything. But what does a simple mind really thinks when faced with a down website? Imagine yourself, you are sitting down at home after a long long day at work. You have had your coffee with you and you just can't wait to plan this calming vacation after waiting for months and months. Don't get too excited, there is a surprise waiting for you on the other side of the screen. Apparently, you can't reach the website you were supposed to book everything from.

Scanning images in Azure Container Registry.

With the 2.0 release of Sysdig Secure, we’re excited to support new integrations with services Azure provides around containers and Kubernetes. Today we’ll be diving deeper into how to integrate Sysdig Secure with ACR (Azure Container Registry) to scan images for for security, compliance, and reliability.

OpsGenie is joining Atlassian!

Today we are delighted to announce that Atlassian has entered into an agreement to acquire OpsGenie. Six years ago, my co-founders and I recognized that always-on services were becoming commonplace, customers’ expectations were growing, and service disruptions had increased potential to impact a company’s revenue and reputation. As a result, the pressure on IT professionals was changing, but the tools to help them stay aware and in control of issues were not.

Simplifying security auditing, Part 4: Securing web servers

Web servers are front-end facing applications that are vital for the daily operations of businesses. They are subject to attacks such as SQL injection, malicious URL requests, and the age-old classic, denial of service (DoS) attacks. While there are specialized web application security solutions that you can (and should) deploy, auditing web server logs is just as important for ensuring your web servers are secure and always up and running.