Operations | Monitoring | ITSM | DevOps | Cloud

400 Million Reasons Hackers Will Target Microsoft Again...

Yesterday, like many others in the tech community, I found myself pausing to fully grasp the implications of the Microsoft SharePoint hack. As one of the most widely adopted document management and collaboration platforms globally, SharePoint’s compromise inevitably sends ripples of concern through businesses everywhere. This news reminded me of a conversation I had just last week with an enterprise customer. We were discussing how one might approach cybersecurity from a hacker’s perspective.

Stop Committing Too Soon With This Git Hack!

Need just one commit from another branch — but don’t want to commit it yet? In this episode of Wait… Git Can Do That?, we show you how to use git cherry-pick -n to stage changes without committing. Perfect for bundling, editing, or staging carefully Keeps history clean Bonus: In GitKraken Desktop, cherry-pick visually and decide when to commit More control. Less commit anxiety. Subscribe for more Git tricks and GitKraken power moves.

Free for the Community, Built by JFrog: Introducing the DSSE Attestation Online Decoder

Attestations, or as we like to call them, evidence, are a critical piece to proving software supply chain integrity and security. However, without the right tools and processes, reviewing and verifying attestations can be time-consuming. At JFrog, we’re deeply committed to empowering developers, DevOps, and Security teams to make these complex workstreams as simple as possible.

Agentic Workflows That Actually Work (and Don't Take Six Months to Deploy)

There’s a hard truth in IT: everyone wants automation, but nobody wants to wait six months (or more) to get it off the ground. Traditional automation initiatives are often bogged down in backlog, scripting complexity, and integration chaos. That’s exactly what makes agentic workflows different. Agentic workflows don’t just automate tasks; they act. They understand intent, operate autonomously, and improve over time.

The Quest For The Five Minute Deploy

The Quest For The Five Minute Deploy Speed is everything at incident.io. The faster we can test and ship code, the faster we can get new products and features out to customers. Over the last three years, as our codebase grew and our test suite expanded, we drifted away from our own goals: "We aim for less than 5 minutes between merging a PR and getting it into production." This is the story of how we got back on track.

How to Set Up a VPN: Complete Guide With Steps

Breaches of online privacy have become a serious issue in any IT environment, which is why a VPN is a handy tool to secure your digital footprint. In this video, we’ll show you how to set up a VPN through a complete step-by-step guide. Chapters: Introduction 00:01 What is a VPN 00:22 Why should you use a VPN 00:43 How to set up a VPN 01:12 Troubleshooting VPN issues0 1:44.

(Full Episode) IT Horror Stories: Human Error Ep11 S1

IT isn’t just wires and widgets. It’s a minefield of lurking disasters waiting to strike. Few know that better than Mark Settle, 7-time CIO and author, who’s survived more operational horrors than most dare imagine. In this episode, Mark takes us into the shadowy corners of enterprise IT, where outdated processes haunt progress, bad news festers in silence, and AI ignorance prowls like a predator in the dark. He shares battle-tested wisdom from a career spent defusing digital disasters and building resilient, process-driven teams that can take a punch.