IT systems management and monitoring
Learn about the tools and technologies that enable more visibility into IT infrastructure, integration between IT management tools, tailored alerts for IT professionals and new areas of performance monitoring and management.
Top Stories
-
Tip
15 Nov 2024
Guide to the advantages of using the Windows Terminal app
Admins who manage a wide range of resources will want to try this Microsoft app that integrates with Windows machines, cloud services and Linux systems from a single interface. Continue Reading
-
Podcast
14 Nov 2024
CEO: GenAI changes multi-cloud security, network equation
Aviatrix CEO Doug Merritt sees generative AI apps forcing a more distributed approach to cloud infrastructure, but he believes it will also help SecOps catch up with threats. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
21 Aug 2023
Local Group Policy Editor
Local Group Policy Editor is a Microsoft Management Console (MMC) snap-in that provides a user interface for managing local Group Policy settings on a Windows computer. Continue Reading
By- Robert Sheldon
- Toni Boger, TechTarget
-
Tutorial
21 Aug 2023
How to set up PowerShell remoting over SSH
Microsoft recommends using WinRM to manage Windows machines remotely, but OpenSSH offers other advantages, particularly in organizations that also use Linux systems. Continue Reading
-
News
17 Aug 2023
Vendor-led group vows to fork HashiCorp Terraform
HashiCorp Terraform is a flashpoint of contention in the wake of the vendor's move to a Business Source License, including allegations that it ignored open source contributions. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Answer
14 Aug 2023
How to roll back Git code to a previous commit
Git reset and git revert can be lifesavers for developers. Follow these examples to see which command makes the most sense when mistakes arise during development. Continue Reading
-
News
09 Aug 2023
Several Exchange Server flaws fixed on August Patch Tuesday
Microsoft addresses 74 vulnerabilities this month with the on-premises email server platform returning to the spotlight with corrections to close six security holes. Continue Reading
By- Tom Walat, Site Editor
-
Tip
09 Aug 2023
How to use Reliability Monitor to manage servers
The utility gives administrators a way to look back over time to see what driver updates, software installations or hardware crashes might be related to the sudden instability. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
03 Aug 2023
IT pros mull observability tools, devx and generative AI
Observability as a common language for both developers and operations teams still has plenty of room for improvement in the era of platform engineering, according to experts. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Aug 2023
Experts expect Sumo Logic match post-New Relic acquisition
New Relic and Sumo Logic were both taken private by the same firm, as consolidation -- and attrition -- continues among observability tools. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
31 Jul 2023
Enterprises rework log analytics to cut observability costs
Organizations such as Netflix could be a harbinger of an observability cost crisis, where monitoring cloud-native apps comprises an untenable portion of operational costs. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
28 Jul 2023
Tips and tools for collecting helpful Kubernetes metrics
Metrics are an integral part of any Kubernetes deployment. But teams often struggle with identifying the right metrics and choosing the right tools to gather the most helpful data. Continue Reading
By -
Feature
27 Jul 2023
Industry tackles observability's data management problems
Enterprises and the vendors they buy from have begun to fundamentally rethink data management for observability, including a new startup with close ties to Cisco. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Jul 2023
Dell Moogsoft AIOps buy could start filling gaps post-VMware
Dell's purchase of Moogsoft this week could help it regain some enterprise software appeal it lost when it spun out VMware. But the future is unclear for Moogsoft users. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Opinion
20 Jul 2023
Why AIOps will look at generative AI tools to grow adoption
AIOps generally sees limited results in its current implementations, but generative AI can potentially help expand and monetize these processes for organizations. Continue Reading
By- Jon Brown, Senior Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Tip
20 Jul 2023
Exchange Online post-migration steps for admins
A move to the hosted email platform is an opportunity to streamline how users work with other Microsoft 365 services. But it requires IT to stay current with the product roadmap. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
News
19 Jul 2023
Chainguard automates SBOMs, but has Images-based agenda
Container images, that is. Chainguard Enforce now automates SBOMs, but execs and an early customer say they aren't the ultimate answer to software supply chain security. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Opinion
19 Jul 2023
Sessions at FinOps X highlight FOCUS, sustainability
Costs and sustainability are two hot topics in the FinOps world. Sessions at the FinOps X conference in June focused on these areas and how teams can make better buying decisions. Continue Reading
By- Jon Brown, Senior Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Definition
18 Jul 2023
Resultant Set of Policy (RSoP)
Resultant Set of Policy (RSoP) refers to all the group policies applied to a user and computer. Continue Reading
By -
News
18 Jul 2023
Splunk AI update adds specialized models for SecOps tasks
Splunk AI updates this week included specialized models for SecOps that detect and automatically respond to common issues such as DNS exfiltration and suspicious processes. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
18 Jul 2023
proportional control
Proportional control is a control system technology in which the response (output) is proportional to the difference between a setpoint value and the current value of a process variable. Continue Reading
By -
Definition
18 Jul 2023
real-time monitoring
Real-time monitoring is the delivery of continuously updated data about systems, processes or events. Continue Reading
By- Nick Barney, Technology Writer
-
Definition
18 Jul 2023
flash memory card
A flash memory card -- sometimes called a storage card -- is a small storage device that uses non-volatile semiconductor memory to store data on portable or remote computing devices. Continue Reading
By- Kinza Yasar, Technical Writer
- Garry Kranz
-
Definition
17 Jul 2023
Microsoft System Center
Microsoft System Center is a suite of software products designed to simplify the deployment, configuration and management of IT infrastructure and virtualized software-defined data centers. Continue Reading
By -
Definition
14 Jul 2023
System Restore (Windows)
System Restore is a Microsoft Windows utility designed to protect and revert the operating system (OS) to a previous state. Continue Reading
By- Rahul Awati
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
12 Jul 2023
8 benefits of data center virtualization
Organizations with virtualized data center components can save on hardware, comply easier with regulations and increase speed. Consider virtualization for your infrastructure. Continue Reading
By -
News
11 Jul 2023
Microsoft repairs 5 zero-days for July Patch Tuesday
The company addressed 130 vulnerabilities and provided additional instructions to fully resolve several bugs, which will require extra attention from IT this month. Continue Reading
By- Tom Walat, Site Editor
-
Definition
10 Jul 2023
server hardware degradation
Server hardware degradation is the gradual breakdown of the physical parts of a server. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Brien Posey
- Christine Cignoli, Senior Site Editor
-
Definition
05 Jul 2023
Nagios
Nagios is an open source IT system monitoring tool. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
30 Jun 2023
Alpine Linux
Alpine Linux is a small, security-oriented, lightweight Linux distribution based on the musl C standard library and BusyBox utilities instead of GNU. Continue Reading
By -
Definition
29 Jun 2023
blade server
A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network. Continue Reading
By- Kinza Yasar, Technical Writer
-
Feature
29 Jun 2023
Cued by breach postmortems, fintech refines zero trust
In a quest to continuously improve, Mercury's security leader takes inspiration from other companies' lessons learned, then updates tools and practices accordingly. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
22 Jun 2023
uptime and downtime
In computing, uptime is a measure of how long a computer or service is on and available. Downtime is the measure of how long it is not available. Continue Reading
By -
Quiz
20 Jun 2023
10 WebAssembly questions to test your Wasm knowledge
Test your knowledge of WebAssembly with this tough, ten-question quiz on the benefits and applications of the new Wasm standard. Continue Reading
By- James Montgomery, Senior Features Editor
-
Tip
19 Jun 2023
Explore Red Hat's bring-your-own-subscription model for RHEL
Many organizations use pay-as-you-go models with public cloud providers to run their Red Hat products in the cloud. Explore how bring-your-own-subscription differs. Continue Reading
By- Ryan Arel, Former Associate Site Editor
-
Definition
16 Jun 2023
moves, adds and changes (MAC)
Moves, adds and changes (MAC) refers to a set of tasks that IT teams regularly perform to keep computing equipment up to date and aligned with user and business requirements. Continue Reading
By- Rahul Awati
- Meredith Courtemanche, Director of Editorial Training
-
News
15 Jun 2023
CISA SBOM standards efforts stymied by confusion, inertia
Efforts to establish SBOM standards and guidance have progressed, but unanswered questions persist -- including how the federal government plans to enforce its own requirements. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
15 Jun 2023
When and how to run databases on Kubernetes
Deciding whether to move your database onto Kubernetes requires careful consideration, especially when choosing among deployment options. Here's what to keep in mind. Continue Reading
By -
News
14 Jun 2023
HashiCorp Vault trims SaaS; Boundary hooks up Enterprise
HashiCorp Vault's appeal to a broader field of users gets a boost from a new entry-level cloud service, while a new Boundary Enterprise targets the high end of the market. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
14 Jun 2023
June Patch Tuesday settles two Exchange Server bugs
Microsoft's plans for upcoming security hardening in Kerberos and Netlogon protocols will have admins busy with testing over the next several weeks. Continue Reading
By- Tom Walat, Site Editor
-
Definition
09 Jun 2023
storage pool
A storage pool is capacity aggregated from disparate physical storage resources in a shared storage environment. Continue Reading
By- Sarah Wilson, Associate Site Editor
-
Opinion
08 Jun 2023
ESG study reveals benefits of modern IT service management
ITSM's evolution from a traditional help desk model to an integrated, automated approach has notable benefits for organizations, according to research by Enterprise Strategy Group. Continue Reading
By- Jon Brown, Senior Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
08 Jun 2023
Sysdig CNAPP runtime threat detection wins over BigCommerce
Sysdig's fast, comprehensive data collection, now part of a larger CNAPP product, sealed the deal with the e-commerce company. Next, it might replace vulnerability management tools. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
06 Jun 2023
Compare two Linux security modules: SELinux vs. AppArmor
Use SELinux or AppArmor to protect Linux servers, but examine the differences between them. AppArmor is easier to use but does not give admins as much control as SELinux. Continue Reading
By -
News
05 Jun 2023
Atlassian cloud preps threat tool as security boss departs
Atlassian Beacon shores up cloud security as it adds transparency around security issues, but the chief trust officer role at the company is also changing hands. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
05 Jun 2023
mean time to detect (MTTD)
Mean time to detect (MTTD) is a measure of how long a problem exists in an IT deployment before the appropriate parties become aware of it. Continue Reading
By- Meredith Courtemanche, Director of Editorial Training
-
Tutorial
30 May 2023
Manage IT infrastructure with NSX's multi-tenant features
VMware NSX now supports multi-tenancy, which can help admins manage complex IT environments. Explore what's new and get started with this step-by-step walkthrough. Continue Reading
-
Feature
25 May 2023
Learn about the Azure Stack HCI benefits for admins
The hyper-converged infrastructure offering promises to reduce the headaches associated with running virtualized workloads on hardware sourced from multiple vendors. Continue Reading
By -
News
24 May 2023
Event-Driven Ansible early adopters share lessons learned
Beta testers of the new Event-Driven Ansible tool from Red Hat said expanding automation and moving toward self-healing systems requires fresh skills and organizational shifts. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
16 May 2023
How CXL 3.0 technology will affect enterprise storage
Understand CXL 3.0 technology before its impacts on storage take serious effect. While the specification improves on previous generations, it could also demand more from storage. Continue Reading
By- Jim Handy, Objective Analysis
-
Definition
15 May 2023
Microsoft Monitoring Agent (MMA)
Microsoft Monitoring Agent (MMA) is a service used to watch and report on application and system health on a Windows computer. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
12 May 2023
disaggregated server
A disaggregated server is a server whose components and resources are divided into subsystems. Continue Reading
-
Tip
11 May 2023
Follow these steps to decommission Exchange Server
An Exchange Server migration includes a lot of moving parts but it's important to cover the training aspect to make sure your users aren't left behind. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
News
10 May 2023
Cloud repatriation vs. multi-cloud: IT seeks cost relief
Amid fiscal worries, IT orgs reassess cloud investments. Whether they go back on-premises or expand to multi-cloud, they face similar distributed computing management challenges. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
09 May 2023
Light May Patch Tuesday will weigh heavily on Windows admins
A zero-day that targets the Secure Boot feature will require extensive work from sysadmins to protect Windows systems from the Black Lotus bootkit. Continue Reading
By- Tom Walat, Site Editor
-
Definition
08 May 2023
ControlUp
ControlUp is a monitoring software company that sells tools IT professionals can use to manage, monitor and analyze virtual desktop and application performance. Continue Reading
By- John Powers, Senior Site Editor
-
Definition
08 May 2023
phased rollout
Phased rollout is a hardware or software migration method that involves incrementally implementing a new system. Continue Reading
-
Definition
08 May 2023
information systems (IS)
An information system (IS) is an interconnected set of components used to collect, store, process and transmit data and digital information. Continue Reading
-
News
03 May 2023
Observability maven 'cranky' about AIOps embraces GPT
Honeycomb's observability tools will add natural language queries via OpenAI's GPT API, a departure from its co-founder and CTO's broader stance on AI in IT ops tools. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
28 Apr 2023
Get a grip on your infrastructure with a custom MMC
Microsoft provides great administration tools, such as PowerShell and Server Manager. But don't neglect the venerable Microsoft Management Console for its flexibility. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Opinion
28 Apr 2023
At KubeCon 2023, observability and FinOps high on the agenda
With data sprawl increasing as IT budgets shrink, observability and FinOps were hot topics at KubeCon Europe 2023. Get an industry analyst's perspective on trends to watch. Continue Reading
By- Jon Brown, Senior Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Definition
28 Apr 2023
IT monitoring
IT monitoring is a process that gathers metrics on the operations of an IT environment. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
24 Apr 2023
configuration file
A configuration file, often shortened to 'config file,' defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
24 Apr 2023
systems operator (sysop)
In IT, a systems operator (sysop) is a person who runs computer servers and other devices on a daily basis in a data center. Continue Reading
By -
Tip
19 Apr 2023
Tips to avoid a bumpy Exchange 2010 migration to Office 365
Now that Exchange Server 2010 and Exchange 2013 are legacy products, administrators should make the push to migrate to avoid becoming the next ransomware target. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
Definition
19 Apr 2023
Microsoft Hybrid Configuration Wizard
The Microsoft Hybrid Configuration Wizard (HCW) is a tool provided by Microsoft to help organizations set up and configure a hybrid deployment between their on-premises Exchange Server and Exchange Online, which is part of Microsoft 365. Continue Reading
By- Katie Terrell Hanna
- Toni Boger, TechTarget
-
Definition
19 Apr 2023
service discovery
Service discovery is the automatic detection of devices and offered services over a network. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
19 Apr 2023
traceroute
Traceroute is a command-line utility that returns information about the communication route between two nodes on an Internet Protocol (IP) network. Continue Reading
-
Definition
14 Apr 2023
mutation testing
Mutation testing, also known as code mutation testing, is a form of white box testing in which testers change specific components of an application's source code to ensure a software test suite can detect the changes. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Tip
12 Apr 2023
Manage complex IT environments with AIOps and observability
As IT environments grow in complexity, AIOps and observability tools can provide valuable insights and identify problem areas -- but prepare for adoption hurdles along the way. Continue Reading
By -
News
11 Apr 2023
Microsoft mends Windows zero-day on April Patch Tuesday
What's old is new again as multiple security updates from the past made a comeback this month to push the total number of vulnerabilities addressed to 102. Continue Reading
By- Tom Walat, Site Editor
-
Definition
11 Apr 2023
IT incident report
An IT incident report is documentation of an event that disrupted the normal operations of an IT system or had the potential to do so as well as how the situation was handled. Continue Reading
-
Definition
06 Apr 2023
Windows Admin Center
Windows Admin Center (WAC), formerly Microsoft Project Honolulu, is a browser-based management tool from Microsoft that allows administrators to manage Windows servers and clusters from a centralized, graphical user interface. Continue Reading
By- Katie Terrell Hanna
- Tom Walat, Site Editor
-
Definition
06 Apr 2023
Resilient File System (ReFS)
A Resilient File System (ReFS) is a file system that Microsoft developed for use on a Windows operating system (OS) and is designed to overcome some of the limitations in the New Technology File System (NTFS). Continue Reading
By -
Definition
05 Apr 2023
pagefile
In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently. Continue Reading
-
News
29 Mar 2023
Comcast subsidiary survives March Madness with AIOps
AIOps alert reduction brought order to a chaotic environment at TV advertising specialist FreeWheel just in time for a big test of its resiliency during a wild NCAA tournament. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
28 Mar 2023
Deploy WebJEA to empower your users with PowerShell
Give your automation scripts a GUI that makes it easier for end users to get the information they need with a more streamlined approach. Continue Reading
By- Mike Kanakos, Align Technology
-
Tutorial
27 Mar 2023
How to secure passwords with PowerShell
Storing passwords in plain text is bad, but what methods are good? Try one of these approaches, such as secure strings or the SecretManagement module, to encrypt passwords. Continue Reading
-
Answer
24 Mar 2023
Beyond metrics, network SLAs should measure business ops
Enterprises need to ensure network service-level agreements provide a comprehensive view of network service performance to support business operations. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Definition
22 Mar 2023
Virtual Machine Disk format (VMDK)
VMware Virtual Machine Disk format (VMDK) is a format specification for virtual machine (VM) disk image files. Continue Reading
By- Rahul Awati
- Julia Anderson, TechTarget
-
Opinion
22 Mar 2023
Is observability as code overhyped?
Is observability as code as transformative as vendors claim or just another IT buzzword? Learn what to keep in mind when evaluating this emerging approach for your organization. Continue Reading
By- Brian Kirsch, Milwaukee Area Technical College
-
Tip
21 Mar 2023
Improve IT efficiency with a PowerShell self-service portal
You can jump over the technical barriers that impede automation efforts in your organization by exploring how to deploy a web-based portal that hosts your scripts. Continue Reading
By- Mike Kanakos, Align Technology
-
Definition
21 Mar 2023
IT service management (ITSM)
IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use IT. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
20 Mar 2023
HPE to acquire OpsRamp for GreenLake IT ops tools
IT automation specialist OpsRamp will become part of HPE's GreenLake portfolio, adding hybrid cloud visibility and notification tools to the IT conglomerate's SaaS offerings. Continue Reading
By- Tim McCarthy, News Writer
-
Tip
20 Mar 2023
Boost cluster security with Kubernetes vulnerability scanning
Performing vulnerability scans on Kubernetes clusters can help keep container environments secure and running smoothly. Learn what risks to look out for and compare tool options. Continue Reading
By -
Tip
20 Mar 2023
How to prepare for the next version of Exchange Server
The Exchange Server roadmap charts several twists and turns that shows Microsoft deviating from its typical course with the server-based email platform. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Tip
20 Mar 2023
Configure NIC teaming in Windows Server
NIC teaming maximizes network bandwidth and provides redundancy benefits. These steps guide users through NIC teaming configuration in Windows Server with GUI and PowerShell. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Definition
16 Mar 2023
IT operations management (ITOM)
IT operations management (ITOM) is a strategic approach to managing an organization's information technology needs. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
16 Mar 2023
AMD Virtualization (AMD-V)
AMD-V (AMD Virtualization) technology refers to a set of hardware extensions and on-chip features for the AMD family of x86 microprocessors. Continue Reading
By -
Tip
16 Mar 2023
How to approach data loss prevention in virtual servers
As security risks evolve, organizations are turning to data loss prevention tools and methods to combat external and internal risks. Learn how to get started with DLP. Continue Reading
By- Brian Kirsch, Milwaukee Area Technical College
-
Definition
16 Mar 2023
Microsoft Edge
Microsoft Edge is a cross-platform browser created by Microsoft and installed by default on all new Windows devices. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
15 Mar 2023
defragmentation
Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
15 Mar 2023
Group Policy Management Console (GPMC)
Group Policy Management Console (GPMC) is a Microsoft Management Console snap-in that provides a graphical user interface that enables Active Directory (AD) administrators to manage Group Policy Objects (GPOs) from one console. Continue Reading
By- Andrew Zola
- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
News
14 Mar 2023
Microsoft stops two zero-days for March Patch Tuesday
The company corrects actively exploited vulnerabilities that affected Microsoft Outlook and the Windows OS in this month's batch of security updates. Continue Reading
By- Tom Walat, Site Editor
-
Definition
14 Mar 2023
Windows event log
The Windows event log is a detailed record of system, security and application notifications stored by the Windows operating system that is used by administrators to diagnose system problems and predict future issues. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
10 Mar 2023
NDIS (Network Driver Interface Specification)
Network Driver Interface Specification (NDIS) is a Microsoft Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should communicate with each other. Continue Reading
By -
Tutorial
09 Mar 2023
Build a PowerShell performance monitoring script step by step
A PowerShell performance monitoring script defines and keeps track of system metrics. Learn to set up and query performance counters and use the results to build an HTML report. Continue Reading
-
Definition
08 Mar 2023
log analytics
Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
News
08 Mar 2023
White House cybersecurity plan collides with SecOps reality
The White House Cybersecurity Strategy sets lofty goals. But recent market research suggests a significant number of enterprises don't follow existing SecOps best practices. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Mar 2023
SBOM graph database aims to be cloud security secret sauce
An open source consortium that includes Google plans to release a deployable beta of the GUAC project this month, a possible milestone for cloud-native SBOM. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
28 Feb 2023
Use Cockpit for Linux remote server administration
Linux admins can use Cockpit to view Linux logs, monitor server performance and manage users. Use the tool to help admins manage servers, regardless of experience level. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
27 Feb 2023
Compare Azure DevOps vs. Jira for IT ops project management
Azure DevOps and Jira can both be effective project management tools for software development and IT ops teams, but the two differ in terms of benefits, features and limitations. Continue Reading
By