Operations | Monitoring | ITSM | DevOps | Cloud

How to get started with Calico Observability features

Kubernetes, by default, adopts a permissive networking model where all pods can freely communicate unless explicitly restricted using network policies. While this simplifies application deployment, it introduces significant security risks. Unrestricted network traffic allows workloads to interact with unauthorized destinations, increasing the potential for cyberattacks such as Remote Code Execution (RCE), DNS spoofing, and privilege escalation.

How to Detect Insider Threats: An In-Depth Guide

Cybersecurity threats don’t exclusively come from external attackers—insider threats must also be considered and mitigated. Insider threats come from employees, contractors or business partners who have legitimate access to IT systems to fulfill business functions. They have access to data and systems that are valuable to cyberattackers or would cause reputational damage if disclosed outside the organization. For example, an insider could leak private company information.

100% Solutions, Zero Snark: What Makes AlertBot Customer Support Superior

Let’s start with a blatant truth: If we tell you that AlertBot offers “superior customer support,” then you are perfectly within your rights to respond with a tepid “meh,” or perhaps an irritated “so what?” Why? Because EVERY COMPANY in this industry claims to offer amazing customer support. Of course, many of them provide mediocre customer service, and a few of them deliver awful customer service.

Elasticsearch 9.0 & 8.18: Cooked for developers, with another helping of blazing-fast BBQ - 5x faster than OpenSearch

We are proud to be releasing version Elasticsearch 9.0 and 8.18 to Elastic Cloud and self-managed users. The capabilities in these releases have already been available to our Elastic Cloud Serverless users, who have had access to generally available fully managed Elasticsearch on AWS, Azure, and GCP.

Elastic Observability 9.0/8.18: Elastic Distributions of OpenTelemetry (EDOT) now GA, LLM observability, and more

Elastic Observability 9.0/8.18 announces several key capabilities: Elastic Observability 8.18 and 9.0 is available now on Elastic Cloud — the only Elasticsearch offering to include all of the new features in this latest release. You can also download the Elastic Stack and our cloud orchestration products — Elastic Cloud Enterprise and Elastic Cloud for Kubernetes — for a self-managed experience. What else is new in Elastic 9.0/8.18? Check out the 9.0/8.18 announcement post to learn more.

What is an AI agent? A plain-English guide we wrote for ourselves (and you).

AI agents are everywhere in the headlines—and yet no one seems to agree on what they actually are. Ask five companies what it means, and you’ll get five different answers: So yeah—no wonder people are confused. At the highest level, everyone agrees on this: AI agents are systems designed to act on behalf of a user. But that’s where the agreement ends. The big differences come down to how independent they are, how intelligent they really seem, and what kind of work they can do.

Datadog named a Leader in the Forrester Wave: AIOps Platforms, Q2 2025

We are thrilled to announce that Datadog has been named a Leader in the Forrester Wave: AIOps Platforms, Q2 2025. We believe this placement reflects Datadog’s commitment to offering an AI-driven platform that enables customers to observe and secure systems, orient teams, and take action in one place. Datadog sits within your most critical workflows, processing trillions of telemetry data points every hour through your alerts, service maps, teams, on-call schedules, and more.

Monitoring in the Age of Complexity: 5 Assumptions CIOs Need to Rethink

In 2025, the average enterprise juggles over 150 SaaS applications, hybrid cloud infrastructures, and a workforce that expects seamless digital experiences—yet most CIOs still rely on monitoring strategies built for the data center era. The result? A $1.5 trillion annual hit to global GDP from downtime and performance lags, according to recent industry estimates. The problem isn’t the tools—it’s the thinking behind them.

COREDUMP #006: Pebble's Code is Free: 3 Former Pebble Engineers Discuss Why It's Important (PT. 2/2)

In today’s Coredump Session, the team reunites to unpack the behind-the-scenes lessons from their time building firmware at Pebble. This episode dives into the risks, decisions, and sheer grit behind a near-disastrous OTA update—and the ingenious hack that saved a million smartwatches. It’s a candid look at the intersection of rapid development, firmware stability, and real-world consequences.

(Full Episode) IT Horror Stories: Last Out Ep4 S1

In this episode, information security analyst in the professional sports world, Matthew Schuster, joins host Jonathan Crowe to discuss Matthew’s harrowing IT horror story from the early days of the Covid pandemic. Matthew shares how his small but mighty team chased down and shipped out laptops to support his organization's quick transition to fully remote work (cutting a 12-month planned rollout down to just three days), how a dedicated leadership team helped his team knock it out of the park, and lessons learned from operating under pressure.