Monitoring and Observability

Latest Posts in

Defining Your IT Journey

The IT journey is really nothing more than your career plan or goals that you have for your career. It’s the story of you. I call it the IT Journey because it’s…

Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities

In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…

Culture of Data Protection: Development Counts, Too.

In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most…

Security Pain Points: Upper Management and Budget

Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper…

Monitoring Your Systems in the Cloud

What happens to our applications and infrastructure when we place them in the cloud?  Have you ever felt like you’ve lost insight into your infrastructure after migrating it to the…

Viewing the Network as an Ecosystem

Many of us have or currently operate in a stovepipe or silo IT environment. For some, this may just be a way of professional life. But regardless of how the…

Cybersecurity Fundamentals – Threat and Attack Terminology

In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…

The Word “Customer” is NSFW

A recent conversation on Twitter struck a nerve with me. The person posited that, “If you’re a sysadmin, you’re in customer service. You may not realise it, but you are…

Building a Culture for Data Protection

Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data…

Disaster Recovery – The Postmortem

So you’ve made it through a disaster recovery event. Well done! Whether it was a simulation or an actual recovery, it was possibly a tense and trying time for you…