Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Sarbanes-Oxley (SOX) Compliance: How SecOps Can Stay Ready + Pass Your Next SOX Audit

Since its passing in 2002, the Sarbanes-Oxley Act (SOX) has become one of the leading regulatory compliance requirements for U.S. companies. It’s synonymous with corporate governance and financial reporting standards for publicly traded companies. Companies spend millions of dollars and thousands of hours ensuring SOX compliance. Scrutiny is high for organizations subject to it, and the penalties can be crushing.

4 ITSM Automation Moves to Boost Business Growth Through Change

The life of an L1 engineer … receiving all the tickets, providing all the IT services, and interacting with all the stakeholders. Tickets, like requests for access to an application or system, account unlocks, onboarding and offboarding employees, and more are here to stay.

Blocking deployments with your IDP

Most Cortex customers begin their journey by populating their service and resource Catalogs, creating their first few Scorecards, and setting up any time-sensitive Initiatives. These features help bring visibility and accountability to internally developed software, revealing consistency issues and enabling teams to act quickly to resolve.

What's the Difference Between an Agile Retrospective and an Incident Retrospective?

Blameless Chief Operating Officer Ken Gavranovic recently sat down with Lee Atchison, a renowned expert in system reliability, to discuss the topic of conducting effective incident retrospectives. You can watch their engaging, informative discussion below, or read on for our overview of the greatest hits from their talk. ‍ Agile development and incident management are the backbones of any tech-driven development cycle. At the heart of these practices lies the art of retrospectives.

Automate development best practices across your toolchain | Sleuth Automations

Automate best practices across your toolchain with Sleuth Automations. Introducing our powerful automations framework and marketplace that allows software development teams to discover and implement best practice workflows with a single click. It's time to improve engineering efficiency even more rapidly, continuously and easily with automation. Give Sleuth a try and see how we empower software teams to build faster by making engineering efficiency easy to improve and measurable — in a way that both managers and developers love.

Strengthen Your Security in the Cloud

Managing security in the cloud and throughout hybrid environments is a challenge with high stakes — customer data, sensitive information, access privileges, and other cloud-based assets are all at risk when an organization uses the cloud. Let’s explore some common cloud-based security concerns and learn how to keep your cloud environment secure.

AWS KMS Use Cases, Features and Alternatives

A Key Management Service (KMS) is used to create and manage cryptographic keys and control their usage across various platforms and applications. If you are an AWS user, you must have heard of or used its managed Key Management Service called AWS KMS. This service allows users to manage keys across AWS services and hosted applications in a secure way.