Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What is Defense in Depth and how can you apply it with Ubuntu?

Find out how you can apply a Defense in Depth approach with Ubuntu. Ubuntu’s security offerings are much more than just a collection of tools: they are an ecosystem of layered defenses, each tuned to address specific threat levels and attacker capabilities. By understanding the unique threats each layer counters, you can make informed choices about which defenses are most important for your environment.

A comprehensive guide to NIS2 Compliance: Part 1 - Understanding NIS2 and its scope

The EU NIS2 directive, which calls for strengthening cybersecurity across the European Union, is now active in all member states. Join me for this 3-part blog post series in which I’ll explain what it is, help you understand if it is applicable to your company and how you can become NIS2 compliant.

Securing Argo CD for 2025: Looking Back at Key Achievements and Innovations in 2024

Argo CD is a declarative, GitOps-based continuous delivery tool designed to simplify and streamline application deployments in Kubernetes environments. As part of the CNCF (Cloud Native Computing Foundation) ecosystem, Argo CD has become a cornerstone for teams embracing cloud-native development practices. At its core, Argo CD ensures that the desired application state defined in Git repositories is automatically synchronized with the live state of applications running in Kubernetes clusters.

8 Evolving IT Services That Enhance Business Continuity

These days, with everything moving so quickly online, businesses really can't take too long to be offline. When things go down, everything can grind to a halt, customers get annoyed, and you could lose a lot of money from just one hiccup. But a new vibe is coming in with IT services offering solutions to keep things running smoothly, even when problems arise. Here's how evolving technology transforms business continuity from a luxury into a standard practice.

Trusting Cribl: Strengthening Your Software Supply Chain with Transparency and Security

Let’s face it—the term "software supply chain" can feel like navigating a maze of tech jargon. Commit signing, Software Composition Analysis (SCA), eBPF monitoring, SBOM generation, provenance attestations… the list goes on. But at its core, the software supply chain is the backbone of modern development, and its security is non-negotiable. A single vulnerability in this chain can ripple through entire systems, leading to breaches, downtime, and reputational damage.

12 Ways IT Operations Can Improve Email Monitoring

If you want to make communication across your organization more reliable,protect sensitive data, and maintain compliance with industry standards, it's essential to monitor your email activity. But you already know this; the question is, how do you do it in the most effective way?

10 Application Security Vulnerabilities and Defensive Strategies

Application security is a critical aspect of maintaining trust and integrity in your software. With an increasing number of cyberattacks targeting vulnerabilities in applications, it is essential to understand the common risks and take defensive measures to safeguard systems. Below are 10 prevalent application security vulnerabilities, along with real-world examples and effective defensive strategies.

What to Do With Your Company's Old Phones?

Businesses often upgrade their devices to keep up with the latest technology. But should businesses sell old office phones, or are there other alternatives? Instead of letting them collect dust in a storage room, there are smarter and more sustainable ways to deal with them. Here are five tips to handle your company's outdated phones responsibly and effectively.