Back to Insights

All Articles

Explore our comprehensive collection of insights, case studies, and best practices across cybersecurity, DevOps, and observability.

Showing 13 articles

The Shift from Passive Response to Active Validation
Security
8 min read

The Shift from Passive Response to Active Validation

Adversarial Exposure Validation (AEV) technology helps organizations validate their defensive posture against attack scenarios and techniques. It enhances exposure awareness, improves attack scenario readiness, and supports continuous threat exposure management.

Vsceptre Security Team
May 15, 2025
The Disruptive Effects of Mobile Application Outages on Large Enterprises in Hong Kong
DevOpsObservability
7 min read

The Disruptive Effects of Mobile Application Outages on Large Enterprises in Hong Kong

In today"s digital age, mobile applications are essential for large enterprises to connect with customers and drive growth. However, even the most meticulously tested apps can experience outages, leading to significant consequences for both users and the organizations behind them.

Vsceptre Team
Jan 21, 2025
The build-or-buy dilemma in Feature Management
DevOps
6 min read

The build-or-buy dilemma in Feature Management

Organizations invest significant time, often months or even years, into modern application development life cycles. However, deployment can feel like a pivotal moment. While many Continuous Integration/Continuous Deployment (CI/CD) practices aim to simplify and reduce the stress of deployment by making it a regular occurrence, it can still pose substantial challenges and lead to various issues.

Vsceptre Team
Dec 16, 2024
Validating your cyber defence effectiveness through Breach and Attack Simulation (BAS)
Security
5 min read

Validating your cyber defence effectiveness through Breach and Attack Simulation (BAS)

BAS is a proactive approach that automates the process of simulating cyber attacks such as phishing campaigns, malware, or exfiltration, to name a few, and then evaluates the organization"s defences. The aim is continuous identification of vulnerabilities across different devices or systems, keep organization ahead of the evolving cyber threats and minimize the security gaps.

Vsceptre Security Team
Dec 9, 2024
Securing Critical Infrastructure: Best Practices for Privileged Access Management (PAM)
Security
6 min read

Securing Critical Infrastructure: Best Practices for Privileged Access Management (PAM)

In today"s digital landscape, protecting critical infrastructure is crucial for maintaining the stability of essential services. With increasing cyber threats targeting sectors like energy, banking, and healthcare, managing privileged access to critical systems has become more important than ever.

Vsceptre Security Team
Dec 4, 2024
Implementing a production ready chatbot solution with governance and monitoring
ObservabilitySecurity
7 min read

Implementing a production ready chatbot solution with governance and monitoring

As a company focused on IT consultancy and system integration, we have accumulated a large number of sales and solution briefs for various products over the past few years. We decided to implement an internal chatbot solution to better support sales activities.

Vsceptre Team
Nov 6, 2024
Uncovering Suspicious Domain Access in a company Network with Threatbook"s OneDNS and Splunk Stream
ObservabilitySecurity
8 min read

Uncovering Suspicious Domain Access in a company Network with Threatbook"s OneDNS and Splunk Stream

As your trusted ally in fortifying digital defenses, we understand that it can be difficult to pinpoint the users who have accessed dubious domains within your network. This task can be even more daunting in a larger-scale environment where the underlying on-prem infrastructure is subject to strict limitations on modifications.

Vsceptre Team
Jan 18, 2024
Demystifying Log to Trace correlation in DataDog
DevOpsObservability
6 min read

Demystifying Log to Trace correlation in DataDog

If you have a chance to attend any presentation or public seminars from the APM vendors, you may come across some demonstrations of how easily to jump from trace to log or log to trace to diagnose a slow API call. This is one of the key differentiation of using a siloed approach for monitoring vs true full stack visibility.

Vsceptre Team
Sep 21, 2023
Log Sensitive Data Scrubbing and Scanning on Datadog
ObservabilitySecurity
5 min read

Log Sensitive Data Scrubbing and Scanning on Datadog

In today"s digital landscape, data security and privacy have become paramount concerns for businesses and individuals alike. With the increasing reliance on cloud-based services and the need to monitor and analyze application logs, it is crucial to ensure that sensitive data remains protected.

Vsceptre Team
Sep 6, 2023
Monitoring temperature of my DietPi Homelab cluster with Grafana Cloud
Observability
9 min read

Monitoring temperature of my DietPi Homelab cluster with Grafana Cloud

At around end of March, I want to get my hands on the old raspberry pi cluster again as I need a testbed for K8S, ChatOps, CI/CD etc. The DevOps ecosystem in 2023 is more ARM ready compared with 2020 which makes building a usable K8S stack on Pi realistic.

Lindsay Chung
Aug 20, 2023
Setting up the first SLO
NewsObservability
6 min read

Setting up the first SLO

This is the final piece of the 3 part series "The path to your first SLO". We have discussed on the basics of what to observe and how to get the relevant metrics in part 1 and part 2 of this series. This time we are going to have a quick look on to setup a simple service availability monitoring SLO with Nobl9 and SolarWinds Pingdom.

Vsceptre Team
May 10, 2023
How to obtain the metrics for SLO tracking
NewsObservability
5 min read

How to obtain the metrics for SLO tracking

This is part 2 of the 3 part series "The path to your first SLO". When you have a clear understanding of what metrics to gather for SLO, the next question is how to obtain and gather those metrics. Basically the metrics can be obtained by the following methods.

Vsceptre Team
May 5, 2023
How to identify the golden metrics for SRE
NewsObservability
7 min read

How to identify the golden metrics for SRE

This is part 1 of the 3 part series "The path to your first SLO". When talking about building an observability practice, many customers we talked to struggled on what to observe and usually frustrated with the alarm storms or false alarms. ITOps are concerned about centralized monitoring and gather metrics from different systems for proactive monitoring.

Vsceptre Team
Apr 29, 2023