Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

BygoneSSL happened to us

A few months ago I wrote about BygoneSSL and the 1.5 million domains with valid certificates owned by someone else. Domains change hands but certificates don’t know. The old owner keeps their private key, and the certificate keeps working. It’s an industry problem, but it turns out it’s our problem too. We purchased certkit.dev for internal development and demos.

A Technical Guide to Controls Engineering

The modern world runs on mission-critical software. It moves our money, drives our cars, diagnoses our illnesses, and fundamentally improves our lives. But, organizations building this critical software face a paradox: they need to move fast to stay competitive, but they also need rigorous governance to manage risk. This has created a lot of tension in regulated industries.

How to Spot When It's Time to Call in a Bug Sweep Expert

Most people picture "bugs" as something out of a spy film: smoky boardrooms, trench coats, and impossible gadgets. In reality, covert listening and tracking have become unglamorous, affordable, and-crucially-easy to hide in plain sight. A modern "bug" might be a microphone the size of a coin, a repurposed phone left in a drawer, or a tracker slipped into a car's trim. And the victims aren't only celebrities or CEOs. Disputes over money, custody, intellectual property, or workplace conflict are far more common drivers than Hollywood-style intrigue.

How Organisations Save Time and Cost With Automated Media Redaction Software

If your organisation handles body-worn video, CCTV, interview recordings, customer calls, or even screen captures, you already know redaction isn't just a "privacy step." It's a production pipeline-often slow, repetitive, and surprisingly expensive.

Boosting IT Productivity with AI-Driven Spreadsheet Automation

Modern IT teams operate under constant pressure. They are expected to deliver faster, reduce errors, maintain uptime, and extract meaningful insights from ever-growing volumes of operational data. Spreadsheets remain one of the most widely used tools in IT operations, even in organizations that rely heavily on cloud platforms, monitoring systems, and DevOps pipelines. However, manual spreadsheet work often becomes a productivity bottleneck.

5 Ways to Defend Yourself Against Allegations of Data Misuse or Cybercrime

You may have the impression that cybercrime charges only target shadowy and sketchy personalities on the net. Yet you can face serious allegations or charges over a simple login, a shared drive, or a file you thought you could use. However, when data misuse claims surface, your reaction and next steps can determine your tomorrow. Adopting a calm and more informed strategy can help protect your record, reputation, and future.

Why Security and Stability Matter in Infrastructure Management

In the high-stakes world of modern infrastructure management, "move fast but break things" is not a viable strategy. As organizations scale their digital footprints, the competing demands of velocity and vulnerability have created a new operational reality. Today, the integrity of your infrastructure is synonymous with the integrity of your business. For system administrators and DevOps engineers, the landscape has shifted. It is not enough to simply provision servers and deploy applications.

NIS2 and CER Serve a Broader Purpose Than Cybersecurity - The 5 Biggest Risks You Need to Address Now

The European directives NIS2 (Network and Information Security Directive 2) and Critical Entities Resilience (CER) Directive have rapidly sharpened the conversation around digital resilience. While many organizations initially viewed these directives as an extension of their cybersecurity obligations, it is becoming increasingly clear that much more is at stake. These directives require a strategic transformation in how organizations manage risks, processes, and responsibilities.

Environment support in Terraform Provider for Kosli - v0.2.0

We’re excited to announce support of physical environments in the Terraform Provider for Kosli! What’s Included Environment Management: Full lifecycle support for creating, updating, and managing physical environments types: K8S, ECS, S3, docker, server, and lambda. Manage legacy environments as IaC: Import your existing physical environments to have Terraform manage them.

8 Steps Companies Can Take To Strengthen Business Premises Security

Improving the safety of your business premises is a continuous process. New threats appear every year, and physical vulnerabilities can put your team and your assets at risk. Taking a proactive approach helps you stay ahead of potential intruders.