Operations | Monitoring | ITSM | DevOps | Cloud

How the new Datadog plugin enhancements extend interoperability for our customers

At Grafana Labs, we have a “big tent” philosophy: We believe our users should be able to determine their own observability strategy and choose their own tools, so we help users bring different data sources together. Datadog is a powerful product used by many teams, and we hear a lot from customers about how we should further embrace and support this critical data source — which is why we created the Datadog data source plugin a few years ago.

How to Debug Cloudflare Workers with AppSignal

In this article, you’ll learn how to capture error logs in your Cloudflare Workers application using AppSignal. We’ll build a simple workers project and integrate AppSignal’s code to collect the necessary metrics. We’ll also learn how to utilize AppSignal’s dashboard to analyze and track errors. Let’s get stuck in!

Benefits of containerization

As the demands placed on technology have grown, so has the size and complexity of our applications. Today’s developers often face the difficult task of managing huge applications. Further complicating matters is the underlying infrastructure, which can often be as expansive, diverse, and complicated as its applications. The complexity of modern applications introduces many challenges.

What's New in Software Supply Chain Security

With new software supply chain attacks reaching the spotlight at an accelerating pace, security research uncovering novel attack methods, and new mandates and guidelines starting to come into effect -- it can be hard to stay on top of the latest developments and their implications. Catch this session as we break down the recent news related to software supply chain security and what you can do to meet new requirements and protect your software from such attacks.

How to better prioritize vulnerability remediation through automated penetration testing

As most MSPs know, small- and medium-sized businesses are the most likely targets for cyberattacks. They lack many of the resources and infrastructure of their larger counterparts and a single cyberattack can be devastating. Analyzing and remediating vulnerabilities is an essential part of any security program. But current vulnerability management processes spit out long lists of instances that may or may not need remediation.