Author: Gilad Maayan

April 22, 2024 | by Gilad Maayan
Yoast Focus Keyword

Beginner’s Guide to Kubernetes Troubleshooting

What Is Kubernetes Troubleshooting?  Kubernetes troubleshooting is a critical skill for developers and system administrators managing containerized applications. It involves diagnosing and resolving issues within a Kubernetes cluster, ensuring that applications run smoothly and efficiently. Troubleshooting can range from simple configuration errors to complex networking issues, requiring a deep understanding of Kubernetes architecture and components. … Continued

read more
November 16, 2023 | by Gilad Maayan
Yoast Focus Keyword

What is Vulnerability Management?

Vulnerability management is a critical aspect of a cybersecurity strategy. It refers to the systematic and ongoing process of identifying, classifying, prioritizing, and addressing security vulnerabilities in a network environment. This proactive approach to network security aims to minimize the risk of exploitation by attackers. Vulnerability management is about staying one step ahead of potential … Continued

read more
September 15, 2023 | by Gilad Maayan
Yoast Focus Keyword

What Is GitOps and Will It Eliminate Incident Management?

What Is Incident Management?  Incident management is a critical aspect of IT service management (ITSM) that revolves around restoring normal service operations as swiftly as possible after an unplanned interruption or reduction in quality. Also referred to as “incidents,” these interruptions could range from a minor issue like a single user being unable to access … Continued

read more
July 28, 2023 | by Gilad Maayan
DevSecOps

The DevSecOps Toolchain: Vulnerability Scanning, Security as Code, DAST & More

What Is DevSecOps?  DevSecOps is a philosophy that integrates security practices within the DevOps process. DevSecOps involves creating a ‘security as code’ culture with ongoing, flexible collaboration between release engineers and security teams. The main aim of DevSecOps is to make everyone accountable for security in the process of delivering high-quality, secure applications. This culture … Continued

read more
March 29, 2023 | by Gilad Maayan
Top 5 managed detection and response services

Top 5 Managed Detection and Response Services and How to Choose

What Is Managed Detection and Response (MDR)? Managed Detection and Response (MDR) is an approach to cybersecurity that combines advanced technologies, skilled analysts, and a proactive response process to detect, investigate, and remediate cyber threats. MDR is typically delivered as a service by a third-party provider and includes a range of security capabilities, such as … Continued

read more
January 5, 2023 | by Gilad Maayan
continuous delivery 1

Critical Metrics and Alerts in the Continuous Delivery Process

What is Continuous Delivery? Continuous delivery is a software development approach in which code changes are automatically staged for production release.  A foundation for modern application development, continuous delivery extends continuous integration by automatically deploying code changes to test and production environments after the build phase. When properly implemented, developers have deployable build artifacts that … Continued

read more
March 24, 2020 | by Gilad Maayan
Alert overload

How to Avoid Alert Overload From EDR Solutions

In today’s chaotic digital sphere, networks are distributed across an increasingly wide range of hackable endpoints. From smartphones and tablets to Internet of Things (IoT) devices—everything gets connected to the network.  EDR technologies and practices were created for the purpose of providing active endpoint protection and defense. However, if your systems and admins are overloaded … Continued

read more
March 9, 2020 | by Gilad Maayan
DevOps

How to Create DevOps Pipelines That Work

DevOps is a software development practice that combines development and operations teams. When organizations use DevOps, they typically also use agile methodologies for managing and completing projects. The combination of DevOps and agile practices enables teams to build software faster and more efficiently.  One of the primary tools of DevOps is the continuous integration/continuous delivery … Continued

read more
January 23, 2020 | by Gilad Maayan
How Threat Intelligence Can Improve Your Security

How Threat Intelligence Can Improve Your Security

A new cyberattack occurs roughly every 39 seconds. Each of these attacks leaves behind a variety of evidence, including IP addresses, log events and malicious files. This evidence can be incredibly valuable to security teams but only if it’s analyzed and placed in context. There is simply too much attack data from too many sources … Continued

read more

OnPage