Operations | Monitoring | ITSM | DevOps | Cloud

How to Manually Instrument .NET Applications with OpenTelemetry

Welcome to our deep-dive tutorial on manually instrumenting.NET applications with OpenTelemetry! In this comprehensive guide, we walk you through the process of adding OpenTelemetry to your.NET applications to help you better understand and optimize their performance. Whether you're an experienced.NET developer or just getting started, you'll find actionable insights and tips to improve your application monitoring and tracing capabilities.

Micro Product Demo: Ivanti Neurons for RBVM & ASOC in 252 seconds

With Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) and App Security Orchestration & Correlation (ASOC), you can move from detection of vulnerabilities and weaknesses to remediation in minutes — not months. As shown in this video from Ivanti, these offerings deliver a contextualized, risk-based view of your organization’s cybersecurity posture. They work by continuously correlating your infrastructure and applications with data ingested from scanners, threat intelligence, human pen test findings and business asset criticality to measure risk and prioritize remediation activities.

The Future Skills People Need to Succeed in Tech - Civo Navigate NA 23

In this talk, Tamika Reed discusses the future skills needed to succeed in the tech industry beyond coding. As the founder of Women in Linux, she shares insights into Linux administration, infrastructure building, and investing in tech to secure a prosperous career. Discover the latest trends, challenges, and opportunities in the ever-evolving tech world.

The First 48 Hours of Ransomware Incident Response

The first 48 hours of incidents response is the most critical. We will explain few important steps that need to be taken to mitigate the impact on service availability, information systems integrity and data confidentiality. The cyber resilience is also covered by the individual national regulations and directives, so let's take a closer look at it and explain why principles of Network Detection and Response shall be a crucial part of technical measures implementation for regulated entities.

Enhanced Ubuntu Experience on Azure: Introducing Ubuntu Pro Updates Awareness

In collaboration with Microsoft, Canonical introduces Ubuntu Pro update notifications into the Azure Update Management Center. This feature enables users to identify Ubuntu instances that aren't receiving all available security updates, including those delivered via Ubuntu Pro. Ubuntu Pro, a subscription by Canonical, provides enhanced security, maintenance, and compliance tools for organizations using Ubuntu on Azure.

cert-manager can do SPIFFE? - Civo Navigate NA 2023

Ashley Davis, Senior Software Engineer and Maintainer of cert-manager, discusses the capabilities of cert-manager, an easy way to manage certificates in Kubernetes clusters. Ashley highlights the importance of Trust-manager for managing trust bundles, enabling clients to verify certificate legitimacy. Additionally, he explores the potential of using x509 certificates as a universal identity control plane in distributed systems through the concept of "SPIFFE" (Secure Production Identity Framework For Everyone).

Demo Roundup: PagerDuty Operations Cloud for Kubernetes

In this demo, Corbin Mills shows how to use the PagerDuty Operations Cloud to streamline and automate how a node failure is resolved. You’ll see how he uses event orchestration (in PagerDuty AIOps) to enrich an alert with pod names, and automatically runs a job to check the Kube API status, so that a responder has instant context. AIOps is also grouping and suppressing alerts. Then you’ll see how the responder can run more health status checks without the need to SSH into the environment or interrupt a co-worker for access.