Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

What's New in VictoriaMetrics Cloud Q3 2025? From new region in Asia to proactive alerts

The third quarter of 2025 has been a busy one for VictoriaMetrics Cloud! We expanded globally, polished the user experience, introduced new enterprise debugging tools, and delivered smarter alerts to help users make the most of their observability data. If you missed our Quarterly Live Update, don’t worry! You can watch the full recording here: Let’s recap what’s new in VictoriaMetrics Cloud this quarter.

Ep 13: Everyone is winging it: Hope for an AI future

In this episode, we welcome Naomi Buckwalter, Sr. Director of Product Security at Contrast Security, to chat about the evolving landscape of security threats and the dual role of AI in both facilitating and combating these challenges. We explore the increasing sophistication of modern phishing attacks and discuss how security teams must rapidly adapt to stay ahead of emerging threats. We debate the transformative impact of AI on the future job market, where personal qualities and soft skills may increasingly take precedence over traditional technical competencies.

Monitoring Encrypted Network Traffic

How do you spy on a secret message? That's the challenge for network monitoring tools like Suricata today. Encryption is essential for privacy, but it creates massive blind spots for security. Dive into the modern-day cat-and-mouse game of monitoring encrypted traffic. How do you deal with security blind spots in your network?

Redis Performance Monitoring: Combine Logs and Metrics for Complete Visibility

Redis earns its place in modern stacks because it’s an in-memory data store with microsecond latency and rich data structures, making it perfect for things like caching, sessions, and rate limiting. Since it often sits on the request path, small issues (connection churn, blocked commands, memory pressure) can quickly ripple into user-visible incidents.

How we use Datadog to get comprehensive, fine-grained visibility into our email delivery system

Visibility into email performance is indispensable to any organization that counts on its ability to reach people through their inboxes, including Datadog. SREs, FinOps, and many other teams rely on email as a critical channel for communications from our platform, including monitor alerts, usage reports, and service account notifications. At Datadog, we depend on the visibility provided by our integrations for Mailgun, SendGrid, and Amazon SES to optimize our email performance and ensure deliverability.

Happiest Minds boosts IT efficiency and service delivery with Site24x7

As a born-digital, born-agile IT services company, Happiest Minds delivers 24/7 strategic, transformation, and managed services across product digital engineering services, infrastructure management and security services, and generative AI business services. As its customer base and complexity grew, the company needed unified observability, multi-tenant monitoring, and real-time root cause analysis—without the burden of manual effort or siloed tools.

Live in London: Adoption & AI Confessions @ Nexthink Experience

Tim and Tom are back with another special DEX Show Live!—recorded last week at Nexthink Experience London at the Intercontinental by the iconic O2. Day 1 of the world's biggest DEX event saw over a thousand IT pros gather for two days of innovation, insight, and energy. In this lively episode, the hosts are joined by Guillaume Charles, Senior Director of Product Management (Diagnostics) at Nexthink, and Gabriela Moraes from Electrolux to explore the state of digital and AI adoption in the enterprise.

Downtime on the Docket: The Death Sentence for Productivity in Legal Firms

When minutes matter, IT leaders need more than quick fixes; they need foresight. That’s where Teneo’s Managed DEX (Digital Experience Monitoring) comes in. Managed DEX is designed to detect what legal teams can’t afford to miss. It monitors for “ghost traffic”- those eerie, unexplained signals of abnormal network activity that often signal compromise or instability- and other anomalous device behaviors that can precede full-blown outages or cyber incidents.