Operations | Monitoring | ITSM | DevOps | Cloud

Adopt open source securely from bare metal to cloud

It’s no secret that developers prefer to use open-source software in their projects. However, the Log4Shell attack or the more recent PyPl crypto miner packages have taught us that there are questions around how it should be managed. At Canonical we have been dealing with open-source security issues since the very first release of Ubuntu and way before the topic became number 1 on every CISO priority list. In this video, our team discusses how your company can manage these challenges and lay the software foundation of a successful cybersecurity program.

How Article Turns a Spotlight on At-Risk Work to See Gains Beyond Metrics

Torsten Sinnemann from Article shares how he and his teams use Sleuth's new Work in Progress feature to improve beyond just metrics and boost efficiency, morale and value.‍ Sleuth gives software development and engineering teams the most complete and accurate visibility into DORA metrics across your organization and projects. Work-in-progress metrics can also be helpful for communicating execution status to stakeholders, and for tracking if improvement initiatives being implemented are making a difference.

Free ITSM e-book: Service management strategies from 10 ITSM experts and leaders | Sophie Danby

This e-book presents a compilation of service management strategies for the next three years from 10 ITSM experts to help IT leaders stay up to date with industry standards. The e-book also highlights the need to align ITSM strategies with business needs to meet post-pandemic demand.