Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Secure performance testing at scale: Introducing secrets management for Grafana Cloud k6

To simulate real user behavior, performance tests often rely on API keys, tokens, or credentials to interact with real systems. But as your testing suite grows, this sensitive data can start to sprawl across scripts, configs, and environments, increasing the risk of exposure and making tests harder to manage and maintain. To address this challenge, we’re rolling out secrets management for Grafana Cloud k6, the fully managed performance testing platform powered by k6 OSS.

The 2026 software supply chain security gap

AI-generated code is now nearly universal. Enforcement is not. That gap is where your software supply chain is most exposed. Cloudsmith's CEO Glenn Weinstein, Co-Founder & CTO Lee Skillen, and VP of Product Alison Sickelka join Product Marketing Manager Meghan McGowan to unpack the 2026 State of Artifact Management report – a survey-based look at how AI development is reshaping the threat landscape, what organizations are getting wrong, and what the highest-leverage fix actually looks like.

Cloud Security Best Practices Every Company Should Follow

Cloud adoption has accelerated dramatically over the past few years - and with it, so has the attack surface for cybercriminals. Whether you're a five-person startup or a 500-employee enterprise, moving your operations to the cloud without a solid security strategy is one of the most expensive mistakes you can make right now.

Your Facebook Account Has Been Hacked: How to Tell

Facebook is arguably the most popular and largest social media platform globally. Unfortunately, with that, it's also one of the most vulnerable platforms, thanks to the vast majority of individuals using it. Staying secure online requires vigilance across all platforms - whether using mainstream services or exploring specialized networks for reaching dark web forums, hidden wiki sites. Since they have a huge target population, Facebook is adored by scammers and hackers. One day, you might wake up and be surprised that you cannot log into your Facebook account.

The Growing Importance of Anonymous Browsing for Companies

These days, the possibility of a hack is something no business can ignore. You really need to figure out a way of dealing with any problems, and anonymous browsing can be the right solution. It means that you're accessing the internet in a way that you can mask your company's identity. Not only are you hiding the IP and location, but no one will know what device or browser you are using, either. Having that type of anonymity matters a lot, and it will certainly make things much better than expected.

Announcing Kosli's brand new docs

Good docs are how developers work with a product, from first look to daily use. That’s been true for a long time, and it’s becoming more true as developers increasingly hand that work to agents on their behalf. During the last quarter, we’ve been migrating docs.kosli.com from a static Hugo site to Mintlify, and now it’s finally live. Early reactions from our customers: “A marked improvement over the old docs in layout and usability.” “Looking sharp!”

How to Install Terraform for Secure and Scalable Infrastructure Automation | Harness Blog

If your Terraform install is insecure or inconsistent, it can quickly slow down your delivery. A single compromised file or a misconfigured backend can stop deployments for many services. Teams that set up Terraform correctly from the start can scale easily and avoid compliance issues.