Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

From IPVS to NFTables: A Migration Guide for Kubernetes v1.35

Kubernetes v1.35 marks an important turning point for cluster networking. The IPVS backend for kube-proxy has been officially deprecated, and future Kubernetes releases will remove it entirely. If your clusters still rely on IPVS, the clock is now very much ticking. Staying on IPVS is not just a matter of running older technology. As upstream support winds down, IPVS receives less testing, fewer fixes, and less attention overall.

802.1X Authentication for BYOD and Guest Networks

In the modern world of networking, security remains a primary concern for businesses of all sizes. With the proliferation of mobile devices and the increasing trend of Bring Your Own Device (BYOD) programs, as well as the need to support guest networks, companies are facing growing challenges to protect their digital assets and ensure seamless access control. One effective solution to these challenges is 802.1X authentication. This article explores the role of 802.1X authentication for BYOD and guest networks, highlighting its importance, benefits, and how tools like Portnox are enhancing security within these environments.

DDoS Mitigation at the Edge and the Content Delivery Network Advantage

A DDoS rarely announces itself politely. One minute, service is healthy. The next, you're staring at rising error rates and a system that can't scale its way out of trouble, wondering how to respond to the incident. Mitigation at the edge changes the outcome when the attack looks like a messy mix of everything at once. The real advantage of placing a content delivery network (CDN) in front of the origin as a reverse proxy isn't speed. It's containment.

Should you still pay for SSL certificates?

There’s a particular flavor of skepticism that shows up whenever someone suggests using Let’s Encrypt. The security team crosses their arms. “Free certificates? For production? We’re a serious organization. We use Sectigo.” I get it. You’ve been buying certificates from the same vendors for twenty years. They send you invoices, you pay them, certificates appear. It feels responsible, and free feels like a trap. But is it?

The Ultimate Small Office Downtime Prevention Checklist

We've all been there. It is 2:00 PM on a Tuesday, one hour to the deadline, and all of a sudden the internet goes dead. Or the server freezes. Or that critical piece of software decides this is the right time to insist on an update which it cannot perform. What follows is not quietness, but the costly sound of productivity grinding to a halt.

Cloud Strategy for 2026: the Year of Repatriation, Resilience, and Regional Rebalancing

This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing focus on data sovereignty. These challenges have set the stage for 2026 to be the year of repatriation, resilience, and regional rebalancing. Here, Rob Coupland, Chief Executive Officer at Pulsant, offers his insights.

Types of Cyber Security Attacks

Damaging cyber attacks are a rising concern as organizations increasingly rely on digital technology for managing sensitive data and running core business operations. While technology can increase business efficiency, without security measures in place, a digital-first approach can end up introducing vulnerabilities and putting data at risk.

CFEngine 3.27 LTS released - Exploration

Today, we are pleased to announce the release of CFEngine 3.27.0! The code word for this release is exploration. This release also marks an important event, the beginning of the 3.27 LTS series, which will be supported for 3 years. Several new features have been added since the release of CFEngine 3.24 LTS, in the form of non-LTS releases.

What the Latest Google "AI Mode" Means for Users Who Care about Privacy and Better Experiences

When Google introduced its AI highlights above the main search results, we thought that was all the company would push to prove its determination to turn traditional Google Search, praised by businesses for expansive SEO opportunities, into an AI-powered experience. But if you live in the U.S. and have recently paid attention to the Google homepage, there's a new button called "AI Mode." Well, it turns out the company is still working hard not to lose its dominance to competitors.

VirtualMetric DataStream + Amazon Security Lake: OCSF-Ready Security Data Without Custom Pipelines

Security teams are increasingly turning to Amazon Security Lake to consolidate security telemetry across cloud, network, and on-prem environments. Security Lake provides a unified, OCSF-based data repository that powers analytics, threat hunting, and machine learning across AWS services and third-party tools. But to take advantage of Security Lake’s capabilities, organizations must deliver clean, normalized, OCSF-compliant data, and this is where challenges arise.