Operations | Monitoring | ITSM | DevOps | Cloud

Webinar

Secure by Design | Our Plan for a Safer SolarWinds and Customer Community

Companies must change the way they operate to combat increasingly sophisticated cyberattacks across ever-expanding attack surfaces. What we learn from one attack can help us protect against the next. Because the next attack is always on the horizon. What should you do to raise your defenses? SolarWinds President and CEO Sudhakar Ramakrishna and cybersecurity expert and Krebs Stamos Group Founding Partner Alex Stamos discuss our plan for a safer SolarWinds and customer community – grounded in principles you can follow to secure your enterprise.

Effective CI/CD with Github and the JFrog Platform

Are you using GitHub for your SCM and as the starting point of your delivery process? Join this webinar to learn advanced tips and tricks for simplifying and accelerating your CI/CD pipelines with the JFrog Platform on top of GitHub. Sharing a detailed demo of a real-world release pipeline triggered from GitHub, we’ll review best practices and hard-won lessons for how you can streamline your end-to-end process and ensure it meets the security and quality requirements of large-scale enterprise delivery.

Datadog On eBPF

eBPF (extended Berkeley Packet Filter) is a Linux technology that can run sandboxed programs in the kernel without changing kernel source code or loading kernel modules. While the kernel is an ideal place to implement monitoring/observability, networking, and security it wasn't until the recent broad adoption of eBPF that it was feasible. Datadog has embraced the possibilities that eBPF brings in those areas and there are several teams already using eBPF in their products. 

RampChat: IT Leadership In 2021 | Mark Settle | CIO Talk

Most IT groups received praise in 2020 for enabling business operations to continue throughout the Covid crisis. What will it take to be successful in 2021? Seven-time CIO Mark Settle shares his perspective on leadership challenges and opportunities in the coming year, using insights from our fall Operations survey.

Protecting Against the Unpatched Kubernetes Vulnerability (CVE-2020-8554)

CVE-2020-8554 is a vulnerability that allows Kubernetes Services to intercept cluster traffic to any IP address. Users who can manage services can exploit the vulnerability to carry out man-in-the-middle (MITM) attacks against pods and nodes in the cluster. All Kubernetes versions including the latest release (v1.20) are vulnerable to this attack. If your cluster is multi-tenant, or allows unprivileged users to create and update services, you are impacted.

Monitoring Microsoft 365 User Experience using Microsoft Graph

Microsoft Graph has evolved to the API for Microsoft 365. Developers can’t get around it anymore. At NiCE, we have put the Graph API to work and want to share some of the learnings and highlights. Our core use case evolves around synthetic monitoring for M365 services like Teams, SharePoint Online, OneDrive, Exchange, and others. In this session, you will learn about the Graph API’s architecture and value in standard monitoring scenarios.

Calico Enterprise Multi Cluster Management - Federated Identity and Services

Managing multiple Kubernetes clusters can become time consuming and complex. Calico Enterprise can help with built in multi-cluster management capabilities to simplify deployment and ongoing operations, including securing interactions between the clusters, and providing cross-cluster service discovery.