Operations | Monitoring | ITSM | DevOps | Cloud

Beyond the Horizon: Building Cyber Resiliency by Embracing the Inevitable

"Once you address the vulnerabilities you do know about, there will be more vulnerabilities you don't know about," In light of the recent cyberattacks making headlines the latest episode of Beyond the Horizons Podcast Lewis Pope explores how even if you think you're doing everything right, if you're preparing for the IF and not the WHEN you're not cyber resilient.

Reporting CSP Errors in Honeycomb With the OpenTelemetry Collector

The HTTP Content-Security-Policy response header is used to control how the browser is allowed to load various content types. It is used to control which URLs, fonts, images, scripts, and more can be loaded onto the page. It’s a great defense against XSS (cross-site scripting), clickjacking, and cross-site vulnerabilities. The header can also specify a URL that will be used to send reports on violations of these properties.

How Docker Logging Drivers Work

Troubleshooting containerized applications can quickly become complex when logs are scattered across multiple systems. Most DevOps teams face this challenge daily—what starts as a simple container deployment often evolves into a complex logging puzzle. This guide explores Docker logging drivers in depth, covering configuration options, best practices, and practical solutions.

React Logging: How to Implement It Right and Debug Faster

React logging is the practice of recording relevant information about your application's behavior during runtime. Unlike traditional server-side logging, React logging happens in the browser and focuses on frontend concerns: component lifecycle events, state changes, user interactions, performance metrics, and network requests. Effective logging creates breadcrumbs that help you understand application flow and quickly pinpoint problems.

Monitoring the Impossible & Other Use Cases - Webinar by 2Steps Tech with David Dick (co-founder)

2Steps is changing the landscape of proactive monitoring. Now, in this lunch-and-learn, you get a deeper dive on the platform and how organisations are using it for previously-unsolved problems. Observability professionals have described 2Steps saying, “There is no better way to do it,” “It’s incredibly valuable,” “Nothing can really compare,” and “The only reason lots of businesses aren't doing this already is they simply don't know about it.”

Top 5 EHR Systems 2025

Electronic health records (EHRs) are real-time, digital records of patient health information that is maintained by their providers over time, detailing their healthcare journey at length. By using EHR systems, doctors can locate patient information, from anywhere they can connect to their system, including recently administered medications, past medical history, or chronic conditions.

Agentic AIOps: Why Agent-Driven Solutions Are Defining the Future of IT Operations

AIOps is overdue for reinvention. The last decade promised faster resolution and smarter alerts—but most tools are still built on outdated assumptions: linear workflows and deterministic rules. Now, a new model is emerging. Not reactive. Not rule-based. Agentic. Agentic AIOps is about taking action. Products like LogicMonitor’s Edwin AI go beyond recommendations—they correlate, decide, and remediate in real time.

Why You Can't Afford to Ignore Software Supply Chain Attacks

Ivanti’s 2025 State of Cybersecurity Report revealed that just 1 in 3 organizations feel prepared to protect themselves from software supply chain threats. With attackers increasingly targeting third-party dependencies, supply chain attacks may become a painful Achilles heel for cybersecurity if organizations continue to overlook them.

Mastering Network Configuration for Stability and Security

Your network is the central nervous system of your business. Its performance, reliability, and security have a direct impact on your organization’s operations, revenue, and reputation. Yet, lurking within this critical infrastructure is a common source of disruption and risk: network configuration changes.