Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to Achieve SOC-2 Compliance on AWS

SOC-2 is a critical framework that ensures the security, availability, integrity, confidentiality, and privacy of systems and data. It is particularly important for organizations handling sensitive customer information. If you are using any cloud vendor, especially AWS, and aiming for SOC-2 certification then this article is for you. We will provide insights into how AWS supports SOC-2 compliance, and also go through a comprehensive roadmap and practical strategies for meeting these essential standards.

Our Plans for Open Source Puppet in 2025

In early 2025, Puppet will begin to ship any new binaries and packages developed by our team to a private, hardened, and controlled location. Our intention with this change is not to limit community access to Puppet source code, but to address the growing risk of vulnerabilities across all software applications today while continuing to provide the security, support, and stability our customers deserve.

Policy Management - The Key to Unlocking a Secure Software Supply Chain

During this pre-KubeCon online event, we will tackle the big questions that should be at the center of conversation at this year's event. If over 90% of software deployed is open-source; It's time for engineering leaders to make their IDP tooling bets. KubeCon is the opportunity to answer these big questions and share ideas. Don’t miss this opportunity to learn from the leading minds in the software supply chain management about the most pressing questions in the industry today ahead of the only event that matters.

Seamless Connectivity: Dynamic Colocation Explained

In today's fast-paced, ever-evolving digital landscape, businesses need flexible, scalable solutions to manage and deploy applications across multiple regions. With constant fluctuations in demand, the concept of colocation has evolved from a simple server-renting model to an advanced digital strategy that promotes connectivity, reliability, and growth. This article explores the modern concept of dynamic colocation, a hyperconnected model that empowers businesses to meet evolving demands with ease and agility.

Using Kosli to signal a change freeze

Like many software teams, here at Kosli we use a continuous delivery approach. This means that every commit to our trunk is automatically built, tested, and deployed to our production-like staging environment. This provides us with the confidence that every build is potentially deployable to production. We use our staging environment to perform final exploratory testing before we deploy to production. Deployments to production are “on-demand”.

Binary Provenance, SBOMs and the Software Supply Chain for Humans

“What’s really running in prod?” Every engineer will hear these immortal words on a long enough timeline (or career). It might be because a new security zero day was dropped, alerts fired from the depths of a vast microservice architecture, or you might just be looking to know what commit was actually tested. Either way, it often comes with the promise of a stressful day.

DevOps Security Best Practices: 2025 Guide

Is your DevOps security ready for cyber threats? Embrace these best practices and make security your competitive advantage. DevOps, a set of practices that combines software development (Dev) and IT operations (Ops), has revolutionized the way organizations build, deploy, and maintain software. With the rise of cloud computing, there was a need for faster and more reliable software delivery than traditional software development methodologies allowed. DevOps was the natural evolution.

Having a "Secure Network" or "Secure Devices" Isn't Enough Anymore. So, What Is?

There’s this notion that a secure network of devices is not good enough…that what you need is a network of secure devices. However, at Zebra, we believe the only thing that’s acceptable these days is a secure network of secure devices. That’s why we’re working with Google Cloud and Qualcomm Technologies, Inc. to look deep into on-prem and cloud architectures to implement the best security features at every potential access point.