Operations | Monitoring | ITSM | DevOps | Cloud

Fortifying security for Ubuntu on Azure with Metadata Security Protocol (MSP)

We’re pleased to share a security enhancement for Ubuntu workloads on Microsoft Azure. In collaboration with Microsoft, Ubuntu now supports Azure’s Metadata Security Protocol (MSP)—a feature that hardens access to the Instance Metadata Service (IMDS) and WireServer. On Ubuntu, MSP is enabled by the azure-proxy-agent package, Canonical’s integration of Microsoft’s Guest Proxy Agent (GPA).

Model your architecture with custom entities in the Datadog Software Catalog

Every software organization has its own unique architecture and workflows. Beyond services and APIs, teams rely on internal libraries, CI/CD jobs, data pipelines, AI agents, and more to keep systems running smoothly. But as architectures grow more complex and interconnected, it can become difficult to keep track of all the structural dependencies and interactions in one place.

Accelerating SIEM Migration with AI-Native Data Pipelines

Security teams are increasingly realizing that yesterday’s SIEMs weren’t built for today’s world. Legacy platforms were designed for static, on-prem environments where data sources were relatively predictable and volumes were manageable. But the shift to cloud, SaaS, and dynamic workloads has completely changed the equation. Cloud-friendly, flexible, and cost-conscious SIEMs are now table stakes.

Why Does Your Node.js App Crash in Production and How Can You Fix it?

Node.js has become one of the most popular platforms for building scalable and high-performance web applications. Its event-driven, non-blocking I/O model allows developers to efficiently handle thousands of concurrent connections with minimal overhead. However, many businesses still face a critical challenge, Node.js applications often crash unexpectedly in production environments, causing downtime, lost revenue, and damage to brand reputation.

What Does a Customer Support Technician Do?

A customer support technician is a technical professional who helps customers solve issues with hardware, software, and IT systems. They’re often the first point of contact when something breaks, whether that’s a computer glitch, a network outage, or a software error. The role is all about troubleshooting, guiding users through solutions, and making sure technology runs the way it’s supposed to.

The telemetry time bomb - and what to do about it

Telemetry data is growing at an average of 29% a year — doubling costs every 18 months. That’s putting pressure on ITOps budgets, observability platforms, SecOps teams, and SIEM deployments alike. In this post, we’ll explore how unchecked data volumes, siloed tools, and aging architectures are creating a telemetry cost crunch that limits visibility, slows both troubleshooting and threat detection, and impacts business outcomes.

ISO 27001 Certification: Hector Builds Trust with Highest Data Security Standards

Hector is proud to announce that it has achieved ISO 27001 certification, the leading international standard for information security management. This certification confirms that the company applies globally recognized best practices to protect sensitive data, reduce risks, and ensure the confidentiality, integrity, and availability of information.

Top 5 Inventory Management Software for Schools in 2025

In 2025, inventory management has become a crucial challenge for schools. Between laptops, tablets, scientific equipment, audiovisual gear, musical instruments, textbooks, and sports equipment, schools must handle an ever-growing volume of assets. Without the right tool, this often leads to losses, waste, poor allocation of resources, and an overload of administrative work. Fortunately, several inventory management solutions now make it possible to centralize and simplify this task.

What is AI-Native Monitoring? The Complete Guide for Developers

Before we talk about AI-native monitoring, let’s take a quick step back to make sure everyone is on the same page. In software engineering, monitoring is the continuous collection and analysis of data about a system’s health, performance, and behavior. Tools like Scout Monitoring, Datadog, and New Relic traditionally track server uptime, request latency, error rates, and database performance.