Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Understanding Zero-Day Vulnerabilities in Software Supply Chain

A Node.js module with nearly two million downloads a week was compromised after the library was injected with malicious code programmed to steal bitcoins in wallet apps. Join us as we delve into a real-world zero-day supply chain attack. Understand the response that followed, and how attacks like this can be mitigated. Learn from David Gonzalez, Principal Engineer at Cloudsmith and Member of the Node.js security working group, as he walks us through the incident.

What to Expect from Your Application Platform

As enterprises see the need to accelerate their software development processes, traditional operations teams are evolving to become platform engineering teams. These teams are tasked with designing and building self-service platforms for development teams that reduce the amount of work required to build, deploy and operate software securely, all while accelerating the development teams in delivering business outcomes.

Tip of The Day : How to Best Use Incident Templates

Welcome to Statuscast.com's latest video: "How to Best Use Incident Templates," hosted by our very own Director of Customer Experience Engineering! In this power-packed tutorial, Denise Joyal will guide you through the intricacies of optimizing your incident response using Statuscast's cutting-edge Incident Templates feature.

Exploring CNCF's Latest Certifications - Insights from KubeCon NA 23 - Civo TV

Join Christophe Sauthier, the CNCF Training and Certification Lead, as he unveils ground-breaking developments in the world of cloud-native computing from KubeCon North America 2023. In this insightful session, Christophe introduces the latest CNCF certifications, including the Istio 1 Certified Associate, and beta releases of Cilium and Argo certifications.

How to map log volume to teams with Grafana Cloud's Log Volume Explorer | Demo

Investigate the source of high log volumes in Grafana Cloud by leveraging log labels to understand which teams or applications are responsible for log usage. In this video, see how to use the Log Volume Explorer with a point-and-click user interface and explore log volumes by using any combination of labels associated with the logging data. Slice and dice the data as you choose to see log volume broken down by teams, applications, clusters, cloud region.

Analytics Plus webinar: Catch critical signs of vulnerable security protocols

Security is all about addressing every potential vulnerability and creating formidable barriers to deter malicious actors from breaching your sensitive data. Given the multitude of vulnerabilities that need attention, security professionals often find themselves inundated with tasks. It's not just a matter of strengthening your infrastructure; it's about ensuring that every potential entry point is securely sealed to thwart malicious actors' attempts to compromise your infrastructure.

Analytics Plus webinar: How to make the help desk your first line of cyberdefense

When it comes to detecting a cyberattack, machine data such as logs, metrics, and telemetry is all-important. Sifting through mountains of machine data and recognizing threats is one way to secure your organization. But prevention is better than cure, and sticking to the basics and following best practices is the best way to keep threats at bay. Since the help desk holds a record of everything that happens in your IT, connecting help desk operations and events with common gateways helps prevent loopholes from being exploited.