Operations | Monitoring | ITSM | DevOps | Cloud

Anatomy of a Supply Chain Attack Detection and Response

In today's world of global supply chains, a breach never stops at a supplier level but cascades all the way up the chain. So being able to detect and stop a supply chain attack at an early stage before an attacker exfiltrates confidential company data or damages company operations and reputation is critical to your organization's survival. Luckily, hackers always leave a trace, so proper detection can help you stop breaches at an early stage before hackers achieve their goals.

K8s monitoring and observability with ContainIQ

Matthew Lenhard, Co-founder & CTO of ContainIQ, will discuss how to extract value from the Kubernetes events feed. Kubernetes events can provide unique and clear insights into cluster health and performance, but how do you cut through the noise and better understand your environment? In this webinar, we will explain what Kubernetes events are, how to use them, and tools that can be used to get the most out of them.

KubeCon + CloudNativeCon EU 2022 Wrap up - Civo

Over 7,000 people attended KubeCon + CloudNativeCon Europe 2022 which took place in Valencia Spain from May 16-20. From developers, executives, product managers, and marketers, the event consisted of some great workshops and keynotes giving attendees the opportunity to engage with the community and collaborate. Learn more about our experience at the event, what we brought with us to showcase, and the talks by our team!