Operations | Monitoring | ITSM | DevOps | Cloud

How Poor Digital Experience Drives Security Risks at Work #shorts #ivanti

Ivanti’s 2025 DEX report reveals a surprising disconnect: While IT leaders strongly believe in DEX, its adoption and impact are plateauing across industries. Join us for a thought-provoking webinar with Ivanti’s Mariah Shotts, along with special guest and AI expert Rob May. We’ll unpack findings from our global survey of 3,300 IT professionals and office workers, revealing: Whether you’re just beginning your DEX journey or looking to optimize your existing program, this session will help you benchmark your progress, close critical gaps and chart a future-proof strategy.

Accelerating Sentinel data lake deployment | Webinar | VirtualMetric & Microsoft

Microsoft Sentinel data lake is becoming a core component of modern security architectures. In this on-demand webinar, Microsoft and VirtualMetric discuss how security teams can approach Sentinel data lake adoption to improve visibility, control cost, and prepare their data for AI-driven security workflows.

Elastic and Google Cloud's powerful partnership in 2025

In 2025, Elastic and Google Cloud created a powerhouse of AI-driven insights, providing an end-to-end search, observability, and security journey for our joint customers. We continue to partner on many opportunities for success and have made even further progress this year to empower all our users, especially around generative AI (GenAI). This blog highlights our collaboration with Google Cloud to help you harness the power of data at scale as well as our top moments from Google Cloud Next ‘25.

Streamlining Flyway Setup with the Guided Shadow Configuration

Guided Shadow Configuration removes the setup overhead of shadow databases in Flyway Desktop, allowing teams to adopt migrations-based workflows quickly and safely with minimal configuration. A Shadow Database is a disposable, ‘sandbox’ database that Flyway uses to generate and verify migration scripts.

What Our Customers Say: The Real Value of Incident Response Tools

You’re thinking about implementing an incident response tool, but you’re not quite sure what to look for – or which solution is the right fit? Of course, we could tell you a lot about the benefits of an incident response tool. After all, we’ve been involved with our software from day one and know the thinking behind every feature. But how can you know whether an incident response tool like SIGNL4 will truly work for you in real-world scenarios?

Addressing Critical Linux CVEs and React Vulnerabilities #patch

Key Takeaways December Patch Tuesday lineup includes one known exploit in the Windows OS that warrants attention. Third-party Patch Tuesday updates include Mozilla and Adobe. Google Chrome released iOS updates so far, but a Chrome Desktop release is expected this week. Here we are at the final Patch Tuesday for 2025. Microsoft has resolved 56 CVEs (two Critical and 54 Important). Included in this release is one known exploited (CVE-2025-62221) and two publicly disclosed CVEs (CVE-2025-54100 and CVE-2025-64671).

Build a FIPS-enabled Ubuntu EKS image with EC2 image builder

A step-by-step demo using Ubuntu Pro and AWS Image Builder. In this video, we show how to create your own FIPS-enabled Ubuntu EKS image using EC2 Image Builder. The demo walks through creating an image pipeline, defining a recipe, and selecting a custom Ubuntu Pro AMI using SSM Parameter Store to automatically pull the latest available image. The process includes enabling FIPS updates on an Ubuntu Pro machine, validating that FIPS is enabled, and testing that the system is running in FIPS mode.