Operations | Monitoring | ITSM | DevOps | Cloud

DevEx Unpacked 005 - Secure DevOps, Rego Policies & Growing Cloudsmith with Ciara Carey

Episode 005: In this episode of DevEx Unpacked, Alan Carson chats with Ciara Carey, Solutions Engineer at Cloudsmith, about her career journey from developer to DevRel to her current customer-facing role. Ciara shares real-world insights on software supply chain security, how teams are using Enterprise Policy Management (EPM) to control open source risk, and why Cloudsmith’s cloud-native platform is a game changer for DevSecOps workflows.

Beyond the code: On-call, Claude, and cinnamon buns with Leo P.

We’re running a short mini-series on The Debrief podcast called Beyond the code, where we interview our engineers about what it’s really like to build at incident.io. In this episode, we chat with Product Engineer Leo about her time building On-call, our favorite engineering tooling, and what makes our engineering culture as good as cinnamon buns.

Beyond the CMDB: How to build an AI-first data strategy to fuel agentic ITOps

The Configuration Management Database (CMDB) has been the backbone of IT Service Management (ITSM) and IT operations for years. A CMDB is a central repository that stores information about IT assets, configurations, and dependencies, enabling organizations to manage their IT infrastructure more effectively.

Overcome the Break-Fix Model! Switch to Proactive Maintenance

If your team is constantly firefighting issues, it might be time to shift gears. In this short video, our product specialist, Matt Beran, explains how to move from reactive to proactive support with the help of Asset Management tools. We’ll walk through real use cases so you can see exactly how to monitor device health, plan replacements, and detect patterns that point to bigger problems.

Monitor Your Kubernetes Cluster: Get Started in Four Minutes

For enterprises embracing Kubernetes, managing these intricate environments can pose significant challenges. Thankfully, monitoring of Kubernetes clusters is readily achievable using the Universal Monitoring Agent (UMA) in conjunction with DX Operational Observability (DX O2).

Announcing Qovery Observability: the simplest way to understand your application

We are thrilled to announce the next major milestone in our platform vision: Qovery observability! Qovery Observability is our new product, ready to give you the fastest way to gain a crystal-clear, unified understanding of your application and infrastructure. Fully managed, zero lock-in, you keep the data. Devs love it, no DevOps needed. Coming soon!

OWASP CI/CD Part 7: Insecure System Configuration

Insecure system configuration is a textbook example of how neglected settings can create an entry point for attackers targeting your CI/CD pipelines. It’s rarely the cutting-edge zero-day that causes a breach. More often, it’s the unpatched service, the overly permissive role, or the default password that was never changed. While this risk overlaps with CI/CD credential hygiene (covered in Part 6 of our OWASP CI/CD series), the focus here is much broader.

The role of network automation in AI-driven businesses

AI adoption is accelerating across nearly every industry. According to McKinsey’s 2025 State of AI report, 78% of organizations now use AI in at least one business function, up from just 55% the year prior. From real-time analytics to generative tools and process automation, AI is becoming a fundamental part of how modern businesses operate and compete.