Operations | Monitoring | ITSM | DevOps | Cloud

Preview Panel: Bottom or Side? #workspace #ultrawidemonitor

Maximize your workspace! Place the preview panel below your data views or on the right to make the most of your screen real estate, keeping your workflow smooth. Perfect for Service Desk agents and IT pros who want quick access to key information without extra scrolling, no matter the monitor size. Preview layouts and other powerful features are coming in the Fall 2025 release of Alloy Navigator.

14: CNCF, OpenAPI, and Kubernetes with Dan Ciruli from Nutanix

Andrew Hillier sits down with Dan Ciruli, who leads the cloud native product management team at Nutanix. Dan’s got some great stories from his days at Google—back when cloud native and Kubernetes were just getting started, in addition to the knowledge and wisdom he picked up along the way.

Densify Talks, CNCF, OpenAPI, and Kubernetes with Dan Ciruli from Nutanix

<span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start"></span> Andrew Hillier sits down with Dan Ciruli, who leads the cloud native product management team at Nutanix.

Why Healthcare CIOs Are Becoming Transformation Leaders, Not Just Tech Leaders

The role of the healthcare CIO looks nothing like it did a decade ago. Running the EHR, keeping infrastructure online, and managing vendor contracts are still table stakes, but they’re no longer the whole story. Today’s healthcare CIOs are being asked to do something far bigger: lead enterprise-wide transformation.

Monitor Kubernetes Hosts with OpenTelemetry

It’s 3 AM. API latency just spiked from 200ms to 2s. Alerts are firing, and users are frustrated. You SSH into the first server: top, free -h, iostat — nothing unusual. On to the next host. And the next. That’s how most of us learned to debug. The tools worked, and we got good at using them. But as infrastructure became distributed and dynamic, this approach started to break down. Modern monitoring needs more than SSH and top. It needs unified telemetry.

What does risk appetite mean?

Defining your risk appetite – the level of risk your organization is willing to accept – is one of the most important steps to adopting an exposure management strategy. If your risk posture’s out of line with your risk appetite, it’s time to take action. Ivanti’s Chris Goettl breaks down defining your risk appetite and how it helps you make informed decisions about remediating vulnerabilities.

Why Security Must Include Cost Accountability In The Cloud

A SaaS team once spotted their first breach not in a SIEM dashboard, but in their AWS bill. Their compute costs spiked by 400% overnight. Turns out, an attacker had spun up dozens of high-powered instances for crypto mining. Logs eventually confirmed the intrusion, but the cost anomaly was the first signal that something was wrong. This incident isn’t unusual. Cloud costs often reflect consumption, but they can also reflect compromise.

How SSL Certificate Monitoring Prevents Man-in-the-Middle Attacks

Man-in-the-Middle (MITM) attacks remain one of the most dangerous cybersecurity threats. In these attacks, hackers secretly intercept and sometimes alter communication between two parties. Without proper encryption, sensitive data such as passwords, credit card details, and personal information becomes exposed. SSL/TLS certificates encrypt this communication, preventing unauthorized access. However, certificates can expire, become misconfigured, or become compromised, creating security gaps.