Operations | Monitoring | ITSM | DevOps | Cloud

25 cybersecurity bad practices: more than just bad habits

The CISA (Cybersecurity & Infrastructure Security Agency) recently started an initiative to create a catalogue of exceptionally risky cybersecurity bad practices. While this will be a welcome and very useful tool once it is complete, only two practices are currently listed. Since cybersecurity and business decisions can be time-sensitive, we wanted to expand on the CISA’s list.

Announcing our $6M investment to double down on IT incident and Reliability needs

When Squadcast was founded back in 2018, we had a concise yet clear goal—we wanted to make it as easy as possible for companies to manage their IT incident and reliability needs. In the spirit of continuing that mission, today I’m excited to announce our $6M fundraise led by DNX Ventures and backed by Wipro Ventures, Nexus Ventures, and Chiratae Ventures. We’re also pleased to announce the addition of DNX and Q Motiwala to our Board of Directors.

The Evolving World of GitOps and Observability

Is GitOps changing observability as we know it? GitOps has been the buzz word in the DevOps space for several years. GitOps, to those that are not familiar, is an operational methodology for DevOps that leverages a continuous deployment approach with Git as the single source of ‘truth’ for declarative control over both infrastructure and applications.

Teamwork Project Management (Key Statistics)

Teamwork project management is critical to the success of your organization. If you have the right project management tools in place, these will give your team a strategic advantage. A team can only ever be as good as the tools it utilizes. Organizations committed to delivering incredible customer experiences are actively investing in teamwork project management solutions.

Go with your Data Flow - Improve your Machine Learning Pipelines

Many of you are familiar with Splunk’s Machine Learning Toolkit (MLTK) and the Deep Learning Toolkit (DLTK) for Splunk and have started working with either one to address security, operations, DevOps or business use cases. A frequently asked question that I often hear about MLTK is how to organize the data flow in Splunk Enterprise or Splunk Cloud.

Interview with Cybersecurity Specialist Mark Kerzner

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Mark Kerzner, software developer and thought leader in cybersecurity training who is also the VP at training solutions company, Elephant Scale. His company has taught tens of thousands of students at dozens of leading companies. Elephant Scale started by publishing a book called ‘Hadoop Illuminated‘.

How to Find Hibernate Performance Issues in Development and Production

The Java Persistence API (JPA) is used in most Java applications to interact with a relational database. One of its most popular implementations is the Hibernate ORM, because it uses object-relational mapping to abstract database interactions and makes implementing simple CRUD operations very simple. But this abstraction also has its downsides. Hibernate uses a lot of internal optimizations and hides all database interactions behind its API.

Return to Office: the Vital Role of IT

18 months later, organizations around the globe are slowly but surely starting to welcome their employees back to the office – or at least thinking about it. But this is not a “back to normal” kind of thing. Most will recognize that something’s different this time around. Firstly, there is no clear one-size-fits-all return-to-office strategy.