Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Enhancing mission-critical enterprise collaboration with multi-LLM support for Mattermost Copilot

Mattermost is excited to announce the release of v10.0, bringing with it a groundbreaking enhancement to our Mattermost Copilot plugin: support for multiple large language models (multi-LLM). This feature, designed to empower mission-critical enterprises, adds a new layer of flexibility, privacy, and control to your AI-driven workflows.

Investigating TCP timeouts at scale

At Mattermost, we’re on a quest to scale our application by one order of magnitude, from tens of thousands to hundreds of thousands of concurrently active users per installation. Scaling up is a complex effort involving expertise at several different levels. At its core, it’s a game of catching the next bottleneck — whether it’s application CPU usage, memory consumption, database throughput, networking, or any combination of the above (among other causes as well).

Cyber resilience: What it is & why it's important

In today’s age of high-profile data breaches, supply chain attacks, and aging legacy software, smart organizations understand it’s no longer a matter of whether their systems will be compromised but when it will happen next. In fact, one recent study found that 68% of organizations experienced a cyberattack within the last 12 months (experiencing an attack doesn’t necessarily mean it was successful).

Strengthening cyber resilience with data sovereignty

Cyber threats are increasing in severity and frequency, and organizations across a wide range of industries and sizes must stay prepared for outages and other incidents. To protect against these risks, smart enterprises are increasingly embracing cyber resilience, which goes above and beyond cybersecurity practices and helps teams better anticipate, react to, and recover from cybersecurity incidents. This, in turn, ensures the long-term health and success of the business.

Go fixes its 7th code execution bug in the same feature

If there’s one Go programming language feature that just doesn’t seem to catch a break when it comes to security, it’s the CFLAGS and LDFLAGS handling in cgo. This is a feature that lets parts of Go source code control the compiler and linker flags that are used to build that same code.

Potential causes of a collaboration platform data breach

Data is the lifeblood of modern organizations. Since data helps teams make better decisions and provide a competitive edge, it’s also a target of bad actors looking to steal sensitive information or launch ransomware attacks. From software vulnerabilities and weak authentication mechanisms to malware and inadequate access controls, there’s no shortage of ways for hackers to infiltrate networks and gain access to mission-critical data.

Mattermost's cloud optimization journey: Pillars of success, future strategies & lessons learned

Mattermost has embarked on a transformative journey in cloud optimization. This journey is marked by strategic initiatives, innovative approaches, and valuable lessons, all aimed at enhancing efficiency and reducing costs. This blog post explores the successful strategies that have guided our cloud optimization efforts. It also highlights our future direction with an emphasis on ARM/Graviton workloads and shares insights from our experiences, particularly regarding spot instances.

How to secure mission-critical work

The average data breach already costs organizations $4.45 million, and it appears that damages will only become more expensive as time goes on. In fact, one report found that cybercrime will cost the world $10.5 trillion by 2025. While organizations can’t necessarily prevent hackers from targeting their systems, they can take proactive steps to strengthen cybersecurity and develop incident response plans that enable them to keep bad actors at bay and swiftly address incidents whenever they occur.