Operations | Monitoring | ITSM | DevOps | Cloud

Densify Talks, CNCF, OpenAPI, and Kubernetes with Dan Ciruli from Nutanix

<span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start"></span> Andrew Hillier sits down with Dan Ciruli, who leads the cloud native product management team at Nutanix.

Why Healthcare CIOs Are Becoming Transformation Leaders, Not Just Tech Leaders

The role of the healthcare CIO looks nothing like it did a decade ago. Running the EHR, keeping infrastructure online, and managing vendor contracts are still table stakes, but they’re no longer the whole story. Today’s healthcare CIOs are being asked to do something far bigger: lead enterprise-wide transformation.

Monitor Kubernetes Hosts with OpenTelemetry

It’s 3 AM. API latency just spiked from 200ms to 2s. Alerts are firing, and users are frustrated. You SSH into the first server: top, free -h, iostat — nothing unusual. On to the next host. And the next. That’s how most of us learned to debug. The tools worked, and we got good at using them. But as infrastructure became distributed and dynamic, this approach started to break down. Modern monitoring needs more than SSH and top. It needs unified telemetry.

What does risk appetite mean?

Defining your risk appetite – the level of risk your organization is willing to accept – is one of the most important steps to adopting an exposure management strategy. If your risk posture’s out of line with your risk appetite, it’s time to take action. Ivanti’s Chris Goettl breaks down defining your risk appetite and how it helps you make informed decisions about remediating vulnerabilities.

Why Security Must Include Cost Accountability In The Cloud

A SaaS team once spotted their first breach not in a SIEM dashboard, but in their AWS bill. Their compute costs spiked by 400% overnight. Turns out, an attacker had spun up dozens of high-powered instances for crypto mining. Logs eventually confirmed the intrusion, but the cost anomaly was the first signal that something was wrong. This incident isn’t unusual. Cloud costs often reflect consumption, but they can also reflect compromise.

How SSL Certificate Monitoring Prevents Man-in-the-Middle Attacks

Man-in-the-Middle (MITM) attacks remain one of the most dangerous cybersecurity threats. In these attacks, hackers secretly intercept and sometimes alter communication between two parties. Without proper encryption, sensitive data such as passwords, credit card details, and personal information becomes exposed. SSL/TLS certificates encrypt this communication, preventing unauthorized access. However, certificates can expire, become misconfigured, or become compromised, creating security gaps.

Introducing Catchpoint Session Replay: See Digital Experience Through Your Users' Eyes

When was the last time you really saw what your customers experience on your site? We're excited to introduce Session Replay, a new capability in our Internet Performance Monitoring (IPM) platform that lets you step directly into the user's journey. Session Replay is so much more than a platform upgrade. It’s an opportunity to understand, fix, and even prevent the issues that lead to churn, missed conversions, and frustrated users, all from their point of view.

Global Online Meetup: K3k

Even though multi-tenancy isn't a new concept, when it comes to Kubernetes, implementing the concept can come with its own set of challenges - noisy neighbours, operational complexities, and, of course, security considerations. Sounds like a lot? Well, that's why it's essential to strike a balance between flexibility and optimising resource utilisation. Join Divya Mohan at 2 PM UTC on 25th September as she hosts Rossella Sblendido and Jean-Phillipe Gouin to explore how the K3k project from SUSE helps us achieve all this and more in this edition of the Global Online Meetup.

The Next Wave of Automation Makes More Room for Humans

When a system goes down, the impact isn’t just technical. It’s the people in the center of it who adapt, improvise, apply their judgment, and keep the business moving forward. I’ve worked in operations for more than 25 years, and one thing I’ve learned is that in any system, it’s the humans who are the truly resilient part.