Operations | Monitoring | ITSM | DevOps | Cloud

Mattermost

Go fixes its 7th code execution bug in the same feature

If there’s one Go programming language feature that just doesn’t seem to catch a break when it comes to security, it’s the CFLAGS and LDFLAGS handling in cgo. This is a feature that lets parts of Go source code control the compiler and linker flags that are used to build that same code.

Potential causes of a collaboration platform data breach

Data is the lifeblood of modern organizations. Since data helps teams make better decisions and provide a competitive edge, it’s also a target of bad actors looking to steal sensitive information or launch ransomware attacks. From software vulnerabilities and weak authentication mechanisms to malware and inadequate access controls, there’s no shortage of ways for hackers to infiltrate networks and gain access to mission-critical data.

Demo: AI-Accelerated Workflows with Mattermost, Atlassian Jira, Parabol & Microsoft Azure AI

Mattermost integrates with Atlassian Jira and features a bring-your-own LLM capability via the Mattermost AI Copilot plugin. Check out this demo to see how you can quickly review tickets & privately ask questions in a DM with the AI (ChatGPT-4) to look up issues and fetch details, providing personalized summaries and taking next actions.

Mattermost's cloud optimization journey: Pillars of success, future strategies & lessons learned

Mattermost has embarked on a transformative journey in cloud optimization. This journey is marked by strategic initiatives, innovative approaches, and valuable lessons, all aimed at enhancing efficiency and reducing costs. This blog post explores the successful strategies that have guided our cloud optimization efforts. It also highlights our future direction with an emphasis on ARM/Graviton workloads and shares insights from our experiences, particularly regarding spot instances.

How to secure mission-critical work

The average data breach already costs organizations $4.45 million, and it appears that damages will only become more expensive as time goes on. In fact, one report found that cybercrime will cost the world $10.5 trillion by 2025. While organizations can’t necessarily prevent hackers from targeting their systems, they can take proactive steps to strengthen cybersecurity and develop incident response plans that enable them to keep bad actors at bay and swiftly address incidents whenever they occur.

E2E Testing on Github Actions: A walkthrough of our CI workflows | 2024 Guide

In this walkthrough, we take a detailed look at how automated E2E Testing is performed in Mattermost, using Cypress and Github Actions. Learn more about our approach to organizing and running the test cases, and our solutions to the challenges around their automation. Ready to streamline your testing process? Join us in mastering automated E2E Testing with Cypress and Github Actions.