Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Docker scanning for Jenkins CI/CD security with the Sysdig Secure plugin.

In this blog post we’ll cover how to implement Docker Scanning for Jenkins with the Sysdig Secure Jenkins plugin. The plugin can be used in both freestyle and pipeline jobs to scan images and fail the build if the image fails a policy evaluation.

Announcing Incident Command Center Enhancements

The Incident Command Center (ICC) empowers your organization to command, control, and coordinate incident response without having to leave the OpsGenie app. With the ever-expanding demand for always-on services, increasing uptime is just as critical. Streamlining incident response leads to faster resolution of issues and less headaches for your customer.

Key metrics for AWS monitoring

Since 2006, Amazon Web Services (AWS) has spurred organizations to embrace Infrastructure-as-a-Service (IaaS) to build, automate, and scale their systems. Over the years, AWS has expanded beyond basic compute resources (such as EC2 and S3), to include tools like CloudWatch for AWS monitoring, and managed infrastructure services like Amazon RDS for database management.

CloudReady Single Sign-On SAML Integration

Exoprise recently released support for Security Assertion Markup Language (SAML) 2.0 integration to enable CloudReady Single Sign-On (SSO) for user access to CloudReady. Exoprise always supported testing and monitoring web-based SSO like ADFS, Ping, & Okta but had not gotten around to finishing our integrated SAML support – well wait no longer – its here! No more letting users manage passwords in CloudReady unless you want to.

Scanning images in Azure Container Registry.

With the 2.0 release of Sysdig Secure, we’re excited to support new integrations with services Azure provides around containers and Kubernetes. Today we’ll be diving deeper into how to integrate Sysdig Secure with ACR (Azure Container Registry) to scan images for for security, compliance, and reliability.

Simplifying security auditing, Part 4: Securing web servers

Web servers are front-end facing applications that are vital for the daily operations of businesses. They are subject to attacks such as SQL injection, malicious URL requests, and the age-old classic, denial of service (DoS) attacks. While there are specialized web application security solutions that you can (and should) deploy, auditing web server logs is just as important for ensuring your web servers are secure and always up and running.

Jira Ops + OpsGenie: powerful incident management

Software has become part of our daily lives – from sending money using your phone to signing contracts with a click. But all this progress comes with a downside – specifically, downtime. When a popular online service goes down, it disrupts millions of people and costs businesses $700 billion per year in North America alone. Responding to service disruptions has become one of the biggest challenges facing IT organizations today.