Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Inside Qovery's security architecture: how we secure your cloud & Kubernetes infrastructure

Discover how Qovery bridges the gap between developers and infrastructure with a "security by design" approach. From federated identities and unique encryption keys to real-time audit logs and SOC2 Type 2 certification - see how we protect your data while eliminating vendor lock-in.

SSH Check Overview

In this video, learn how to set up and configure SSH checks using Uptime.com. We discuss the frequency options, the importance of Secure Shell (SSH) for secure data communication, and step-by-step instructions for creating a new SSH check in your account. Discover how to set check intervals, configure alert contacts, specify monitoring locations, and ensure your probe servers are whitelisted. Perfect for ensuring your server's remote login capabilities are continuously monitored and secure.

Key Insights from the 2025 GigaOm Radar for Container Networking

In 2025, as modern applications became ever more distributed and the use of Kubernetes continued to proliferate, the role of container networking was critical. Today’s enterprises demand networking solutions that can scale, secure, and connect services reliably, whether those services run across multiple clouds, hybrid environments, or on-premises clusters.

Five Ways to Simplify Data Masking | The Tony and Tonie Show Ep 38

5 signs your data masking is fast, secure, and low-maintenance. Can you protect PII, still deliver realistic test data, and design a data masking solution that’s easy to automate and maintain? Tony and Tonie discuss five key traits of a tool that does just that. Read the full article.

The Role of Automation in Fraud Detection and Customer Service

Fraud poses a greater threat to businesses in the current technological era. Additionally, companies can exceed customer service expectations. Automation is a powerful tool that you can use to alleviate both problems fairly easily. Automating systems will help companies improve security and the customer experience. This post will examine who can benefit from automating fraud detection and customer service.

How to Choose CMMS Software: Key Considerations

Maintenance teams do not fail because they lack effort. They fail because information gets lost between shifts, urgent work crowds out planned work, and parts disappear at the exact wrong moment. Choosing CMMS software can fix those gaps, but only if the system fits how your plant, property portfolio, or service operation actually runs.

DNS-PERSIST-01 validates a domain once to get certificates forever

With the ACME protocol, to issue a certificate you have to prove you control the domain. The CA gives you a challenge, you complete it, and they issue your cert. The trouble is that every validation method has tradeoffs. And as certificate lifetimes get shorter, those tradeoffs will get more painful. DNS-PERSIST-01 is a new approach coming in 2026 that trades proof-of-freshness for easier operations.

The Benefits of Modular Containment Systems in Industrial Safety

In the case of industrial environments, there are certain challenges. Workers, hazardous material and compliance with regulations all involve careful planning and systems that are reliable. Modular containment systems have become a viable solution that would overcome these challenges and somehow offer flexibility and scalability to a large variety of industrial uses.

How Engineered Fall Protection Improves Safety for Rooftop Maintenance Teams

Rooftop maintenance is one of the most hazardous jobs in the modern facility management industry. From HVAC technicians and solar panel installers to roofing contractors, these workers operate on the "front lines" of height hazards. Because rooftops are often perceived as flat and stable, there is a dangerous tendency to underestimate the risks involved. However, the introduction of engineered fall protection has revolutionized how these teams operate, transforming a high-risk environment into a controlled workspace.