Operations | Monitoring | ITSM | DevOps | Cloud

[Demo] Intel TDX 1.0 technology preview available on Ubuntu 23.10

Securing data at run-time has long been an open security challenge. Whether it is malicious insiders exploiting elevated privileges or attackers exploiting vulnerabilities within the platform’s privileged system software, your data’s confidentiality and integrity was at risk.

Delivering Value with a Flat Budget

Join us for an important conversation with Cribl's Ed Bailey and Jackie McGuire, as we navigate the intricate balance of maximizing organizational value with a constrained budget. In today's challenging economic climate, where maintaining operations often means minimal to no additional spending, adaptive strategies become crucial. This is more than just a best-case scenario; it's a necessary approach for business resilience. Ed and Jackie will share innovative ideas and strategies to help leaders skillfully manage tight budgets while delivering significant value to their organizations.

Reducing Data Breach Incidents Recap

The conversation highlights four key takeaways, with a focus on risk-based prioritization and faster remediation. It emphasizes the limitations of traditional models like vendor severity CVSS and the need for better metrics to reduce data breach incidents. The importance of speed in resolving vulnerabilities is also discussed, along with the need to improve time to patch and automate resolution processes.

How will #AI help dev teams work better together? | #GitKraken CTO at #Dockercon

GitKraken's CTO Eric Amodio believes it's about addressing the details that are easy to miss– the random Slack conversations, the PRs, and Issues that slip your mind, consolidating everything into a digestible 'To Do' list that keeps you productive and in-the-know.