Operations | Monitoring | ITSM | DevOps | Cloud

Understanding Zero-Day Vulnerabilities in Software Supply Chain

A Node.js module with nearly two million downloads a week was compromised after the library was injected with malicious code programmed to steal bitcoins in wallet apps. Join us as we delve into a real-world zero-day supply chain attack. Understand the response that followed, and how attacks like this can be mitigated. Learn from David Gonzalez, Principal Engineer at Cloudsmith and Member of the Node.js security working group, as he walks us through the incident.

Innovate at speed with open source AI

AI is swiftly changing our lives in many invisible ways - from the movies we watch and video games we play, all the way to real-time space tracking. New tools and applications pop up all the time, but keeping up with all this innovation is difficult. Which tool chains should you use and which platforms should you build on? Canonical helps you innovate at speed with easy-to-use solutions that benefit from long-term support.

Analytics Plus webinar: How to make the help desk your first line of cyberdefense

When it comes to detecting a cyberattack, machine data such as logs, metrics, and telemetry is all-important. Sifting through mountains of machine data and recognizing threats is one way to secure your organization. But prevention is better than cure, and sticking to the basics and following best practices is the best way to keep threats at bay. Since the help desk holds a record of everything that happens in your IT, connecting help desk operations and events with common gateways helps prevent loopholes from being exploited.

Analytics Plus webinar: Catch critical signs of vulnerable security protocols

Security is all about addressing every potential vulnerability and creating formidable barriers to deter malicious actors from breaching your sensitive data. Given the multitude of vulnerabilities that need attention, security professionals often find themselves inundated with tasks. It's not just a matter of strengthening your infrastructure; it's about ensuring that every potential entry point is securely sealed to thwart malicious actors' attempts to compromise your infrastructure.

Serverless Workflows using Durable Functions and Logic Apps in Azure - Jonah Andersson

In this session titled "Serverless Workflows using Durable Functions and Logic Apps in Azure", DevOps Engineer Jonah Andersson explores Azure Durable Functions and Logic Apps, emphasizing their role in serverless workspaces. She discusses the benefits of low-code/no-code solutions, showcases diverse application design patterns, and much more Concluding with insights on when to use each service, this session offers a concise overview for those interested in serverless computing.

2023 ONUG Fall Panel Discussion: Building Integrated Solutions for Network and Security

Full-Stack Analytics explores the essence of implementing cross-layer, multi-domain analytics, emphasizing the need for an integrated platform that combines endpoint and network security telemetry for holistic threat detection. In this session, we explore the transformative role of AI and machine learning in bolstering real-time intelligence across multiple layers and domains, enhancing predictive analytics and anomaly detection.

How to map log volume to teams with Grafana Cloud's Log Volume Explorer | Demo

Investigate the source of high log volumes in Grafana Cloud by leveraging log labels to understand which teams or applications are responsible for log usage. In this video, see how to use the Log Volume Explorer with a point-and-click user interface and explore log volumes by using any combination of labels associated with the logging data. Slice and dice the data as you choose to see log volume broken down by teams, applications, clusters, cloud region.