Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

Pipelines Full of Context: A GitLab CI/CD Journey
Observability
4 Minute Read

Pipelines Full of Context: A GitLab CI/CD Journey

CI/CD solutions are great. But, how can they enrich our observability practices? Find out how to leverage DevOps data from GitLab CI in Splunk.
Authentication vs. Authorization
Learn
6 Minute Read

Authentication vs. Authorization

Discover the fundamental differences between authentication and authorization, explore techniques, and best practices to implement robust security measures.
How Digital Fingerprinting Tracks, Identifies & Affects Us
Learn
4 Minute Read

How Digital Fingerprinting Tracks, Identifies & Affects Us

Everything you do on the internet leaves behind pieces of data, these make up your digital fingerprint. Here's what to know about managing your privacy online.
Detecting DNS Exfiltration with Splunk: Hunting Your DNS Dragons
Security
7 Minute Read

Detecting DNS Exfiltration with Splunk: Hunting Your DNS Dragons

DNS data is an all-too-common place for threats. Find out how to use Splunk to hunt for threats in your DNS. We will slay those DNS dragons.
What is a Data Scientist?
Learn
5 Minute Read

What is a Data Scientist?

From predictive modeling to AI-driven systems, data scientists harness data to make informed decisions and drive innovation. Here's all you need to know about the role.
What is Patch Management?
Learn
4 Minute Read

What is Patch Management?

Fending off cyberattacks requires preemptive action. Automating and controlling patch deployment helps safeguard against vulnerabilities in your IT systems.