Operations | Monitoring | ITSM | DevOps | Cloud

Top Cloud-Native Guides for 2020

2020 was a busy year for Civo, and we couldn’t have done it, and get where we are now, without our community of users. Between the wider community, our Civo Ambassadors, and our staff team, there is an enormous amount of knowledge and skill to be found. I’d like to present some of our top cloud-native guides for the year gone by, drawn both from guides published on our site and around the web by our community of users.

VirtualMetric: 2020 at a Glance

2020 was a year we all will remember. The whole world got an experience like never before. At VirtualMetric we have always believed in a global team with no borders. This year almost every company joined us in the remote work approach. Despite the challenges we were surrounded by, our team had a productive year. We not only saved our entire crew but hired more talented people to our VirtualMetric family, which helped us to achieve our ambitious goals.

Threat Thursdays: 2020 A Year in Review

We can finally bid a not so fond farewell to 2020. Looking back at our Threat Thursday series in reflection there is no way other than to say 2020 was a brutal year in cybersecurity. 2019 had already driven ransomware into high gear, but the seven-figure ransom extorted from Travelex really set the tone for what was to come this year. The New Year is a time to reflect, but most importantly it’s a time to learn from the past to create a safer, more secure future.

Good Catch: Customer Experience Monitoring

As the customer experience has moved almost entirely online, finding and fixing issues before they impact your conversions, retention, and revenues has become an increasingly complex task. In this article, two real-world examples are presented from the gaming and eCommerce industry that showcase the limitations of static thresholds and the impact that has on customer experience.

MSP Security Incident Response Planning (a Quick Guide)

Every second counts when it comes to Managed Service Provider (MSP) security — the longer it takes an MSP to complete security incident response, the greater the ramifications of the incident on the service provider and its stakeholders. When faced with a cyber attack, it’s crucial to understand the potential consequences of the security incident. It also is paramount for an MSP to establish a plan, so it can quickly and effectively respond to cyber attacks and other security incidents.

13 Marketplaces to Sell or Buy a Website or a SaaS Business

Web design is creative and time-consuming at the same time. But sometimes, selling a design, a template, or a ready to use website can get challenging. It might not prove to be as much of a revenue generator as one would like, and there could be several reasons for it. For one, the justified asking price might get slightly high due to the scale of investment and time involved, and thus, buyers might move to other vendors.

5 Best practices for ensuring secure container images

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the application life cycle is a critical part of security, but many organizations don’t even follow basic best practices for ensuring secure container images.