Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Exploring Ubuntu Confidential VMs with Intel TDX on Google Cloud

Confidential computing is a revolutionary technology that disrupts the conventional threat model of public clouds. In the past, vulnerabilities within the extensive codebase of the cloud’s privileged system software, including the operating system and hypervisor, posed a constant risk to the confidentiality and integrity of code and data in operation. Likewise, unauthorized access by a cloud administrator could compromise the security of your virtual machine (VM).

Residential Proxies for Competitor Analysis in 2025

As you navigate the competitive landscape in 2025, having the best tools at your disposal is essential. Leveraging competitor analysis' residential proxies can provide vital insights to give your business an edge. Your competitor's strategies and tactics hold valuable lessons. Utilizing residential proxies properly allows you to gain a deeply granular view into their activities without compromising your anonymity or getting blocked.

Maximizing protection, minimizing risk: Securing your IT infrastructure with LogicMonitor

Due to the increasing challenges faced in network environments and the consistent threat of cyberattacks, companies must enforce appropriate security measures to protect their data, maintain operational integrity and prevent outages. For example, a recent Microsoft outage was caused by a CrowdStrike update that conflicted with Microsoft’s Windows OS.

Strengthening cyber resilience with data sovereignty

Cyber threats are increasing in severity and frequency, and organizations across a wide range of industries and sizes must stay prepared for outages and other incidents. To protect against these risks, smart enterprises are increasingly embracing cyber resilience, which goes above and beyond cybersecurity practices and helps teams better anticipate, react to, and recover from cybersecurity incidents. This, in turn, ensures the long-term health and success of the business.

observIQ Expands Advanced Support for Sumo Logic in Security and Observability Data

We’re excited to announce that as part of our expanded alliance with Sumo Logic, observIQ extended its support for Sumo’s platform. This allows customers to send logs and metrics to Sumo Logic, leveraging our telemetry pipeline, BindPlane. We’ve also made it possible to automatically recommend processors in our pipeline that format data specifically as Sumo Logic expects—once Sumo Logic is a destination for BindPlane.

Moving Past Annual Audits: Why Continuous Cybersecurity is Essential

It’s 2 am on a Saturday, you’re sound asleep, and suddenly your phone lights up, ringing and buzzing loudly on your nightstand. You know it won’t be good news, but it’s worse than you could have imagined—your network and systems have suffered a ransomware attack. As you quickly change and start driving into the office, you keep asking yourself one question—didn’t we pass our annual security audit three months ago with flying colors?

Zero-Trust mTLS Automation with HAProxy and SPIFFE/SPIRE

Whether you’re running a service mesh composed of HAProxy instances or facilitating communication between multiple systems, ensuring the authentication of traffic between your services is critical. This zero-trust security model operates under the assumption that you should not extend trust without verification, even within your own systems. By verifying every interaction, you mitigate the risks that arise when third parties imitate your systems.

Building an asset attribution system for software security

Asset attribution is an operational necessity for robust digital protection, but hasn't always been easy to achieve. Especially when software state and ownership is unknown, or inconsistent. This blog delves into the historical complexities and challenges of asset attribution for security and engineering teams and explores how Internal Developer Portals like Cortex can help.