Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Enterprise-Grade Software Security: Mastering Control Over Your Software IP

Enterprises should prioritize securing their software artifacts to protect intellectual property (IP), maintain compliance, and mitigate supply chain risks. A strong security posture requires a deep understanding of access management, distribution controls, compliance enforcement, and software lifecycle governance.

The Role of Log Monitoring in Securing Hybrid Cloud Infrastructures

Hybrid cloud services have become a cornerstone for many businesses. These technologies, which combine the strengths of private and public clouds, assist enterprises in achieving their dreams of scalability, flexibility, and cost-efficiency. However, this added optimization comes at a cost, particularly with increased operational complexity and security concerns. To minimize cyber threats and secure their data, businesses must invest in more security solutions, such as log monitoring.

Migrating from Generic to Custom Attestations: A zero-trust approach to compliance

The kosli attest generic CLI command can attest anything, but unlike a “typed” attestation (such as kosli attest snyk), it does not calculate a true/false compliance value for you. Customers have reported that while a generic “escape hatch” is useful, it nevertheless has some drawbacks: Based on this feedback we’ve implemented a new attest command called kosli attest custom.

Kosli Joins FINOS to Collaborate on DevOps Controls and Change Compliance in Financial Services

We are thrilled to announce that Kosli has joined the Fintech Open Source Foundation (FINOS), a Linux Foundation organization dedicated to fostering collaboration and innovation in financial services technology. Our goal is to engage the community establishing common standards and automation practices for DevOps controls and change management automation.

US Federal Government's Role in Filling the Cybersecurity Talent Gap

Currently, there are 500,000 vacant cybersecurity positions in the United States – affecting businesses and government agencies alike. And with the frequency, sophistication and intensity of cyberattacks increasing, including those directed at federal agencies and critical infrastructure, the need for government and industry to work together to train, retain and develop workers with the required technical expertise and skills has never been greater.

7 Common Cybersecurity Mistakes Businesses Make and How to Avoid Them

Businesses today face a barrage of digital threats that can compromise sensitive information and disrupt operations. Cyberattacks are not a distant possibility but a present concern that demands robust defenses. Organizations of every size must invest time and resources into understanding vulnerabilities and building resilient systems. The rapid evolution of cyber threats means that complacency has severe consequences. Whether through weak authentication measures or outdated software, each oversight can be a gateway for hackers. Awareness and proactive measures remain the cornerstones of a secure environment.

How to make Kosli generic attestations using the kosli-attest-generic command

All but one of the kosli attest commands calculate the true/false compliance value for you based on their type. For example, kosli attest snyk can read the sarif output file produced by a snyk scan. The one that doesn’t is kosli attest generic which is “type-less”. It can attest anything, but Kosli cannot calculate a true/false compliance value for you. Often the tool you are using can generate the true/false value, which is then easy to capture.

Building Next-Generation SIEM Operations for Enterprise Security

Cybersecurity today is not just about defending against attacks. It’s about proactively managing risks in a landscape where threats are growing in volume and sophistication. With data volumes rising by 30% in just the past year and the average cost of a data breach now exceeding $4 million, traditional Security Information and Event Management (SIEM) systems are no longer enough.

Moving to a zero-trust model with Kosli's custom attestations

The Kosli CLI provides several attest commands, such as kosli attest snyk, kosli attest jira, etc. These attestations are “typed” - each one knows how to interpret its own particular kind of input. For example, kosli attest snyk interprets the sarif file produced by a snyk container scan to determine the true/false value for that individual attestation.