Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

The issue with DORA metrics #incidentmanagement #podcast

In this clip, Colette explains what the underlying issue is with DORA metrics. About the episode: What if we told you that everything you thought you knew about incident response was wrong. Well, at least some of it. That some of the things you’ve been doing for years might not actually be having the impact you thought they did. Or, even worse, that some of the assumptions you’ve been making have actually been having a negative impact on you, your team and your organization.

Why action items shouldn't be the goal post-incident #incidentmanagement #podcast

In this clip, Colette explains why focusing on coming up with a list of action items post-incident is a big mistake. About the episode: What if we told you that everything you thought you knew about incident response was wrong. Well, at least some of it. That some of the things you’ve been doing for years might not actually be having the impact you thought they did. Or, even worse, that some of the assumptions you’ve been making have actually been having a negative impact on you, your team and your organization.

Azure Cost Management - Generating Cost Scopes

In this video, Michael Stephenson demonstrates how to generate Cost Scopes in Azure Cost Management to democratize the management of cost data. With this feature, engineers and operations teams can manage the costs they incur through the applications they develop. He also shows how to create a Cost Scope manually and generate a tree view based on a deployment-focused view. Learn how to view cost from different dimensions using Cost in Context and generate a tree view based on a tag.

Detect and score application vulnerabilities

With AppDynamics and Cisco Secure Application, you can quickly identify where application vulnerabilities exist and gain insights as to how best to remediate them based on business risk observability. Let technology work for you by keeping up with the most recent vulnerabilities and help you prioritize what to remediate based on business risk.

Mastering Incident Response: A Guide to Becoming a Proficient Security Analyst

Watch the webinar and learn how to: Refine your workflows based on different perspectives Simplify your incident responses by creating more thorough drilldowns of your infrastructure Inform your team of threats based on robust insights and information.