Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Unleashing Progress Flowmon 13: Speed, Smarts and Security Redefined

At Progress, we continue to develop and enhance the Progress Flowmon product family. The latest update brings the core Flowmon product to release 13.0, and it includes remarkable performance improvements, strengthened security and expanded protocol support. Full details of what’s new and improved in the latest release are available on the Flowmon product page. In this blog, we’re excited to highlight the newest features and improvements to the Flowmon solution.

Beyond the Horizon: Vulnerability Management - Turning Cyber Hygiene into Business Confidence

Discover why vulnerability management is critical for cyber and business resilience — and how N-able is reinventing the process. In this episode of Head Nerd Table, Jason Murphy sits down with Jeff Green, Distinguished Product Leader for Vulnerability Management at N-able, to unpack why vulnerability management is no longer optional — it’s essential. Jeff shares insights from his experience as a CTO and MSP leader, explaining how vulnerability management underpins both cybersecurity and business continuity.

An Open SDLC Controls Framework for Financial Services

How can financial institutions align on software delivery governance without slowing down innovation? At FINOS OSFF New York 2025, Deutsche Bank and Morgan Stanley introduced the new SDLC Governance Working Group — an open collaboration under FINOS to create a Common Controls Catalogue for software delivery. Kosli's Mike Long helped form and participates this group, contributing expertise in continuous compliance automation and controls engineering to connect the engineering and policy communities.

Customer panel: Transforming IT & security

In an era where telemetry data grows at a 28% compound rate while budgets remain flat, traditional IT and Security approaches are facing unprecedented pressure. Join our distinguished customer panel as they share their transformative journeys with Cribl's data engine solutions. Our panelists will discuss how Cribl's vendor-neutral portfolio has enabled them to regain control over their data infrastructure, achieving both immediate operational improvements and strategic long-term advantages.

The AI Visibility Problem: When Speed Outruns Security

Harness surveyed 500 security practitioners and decision makers responsible for securing AI-native applications from the United States, UK, Germany, and France to share findings on global security practices. The State of AI-Native Application Security 2025 dives deep into AI visibility and the changing landscape of security vulnerabilities. If 2024 was the year AI started quietly showing up in our workflows, 2025 was the year it kicked the door down.

Protecting Sensitive Information in an Era of Digital Transformation

You might worry about keeping your personal or work data safe as more things move online. In 2023, over half of large companies reported some type of data breach. This blog will show simple ways to protect sensitive information using smart tools and habits. Start learning now to stay ahead of new digital threats!

SIEM Migration in 68 Days

In this session, we will discuss how the University of Pittsburgh was able to modernize their data processing strategy, migrate to a new SIEM solution, and avoid ballooning SIEM costs all within 68 days from the first install of a Cribl product. We will showcase how we were able to use Cribl's software to easily handle the following scenarios: 100% agent replacement and consolidation using Cribl Stream Workers and Edge.

Certificate revocation is broken but we pretend it works

Last week, someone commented on my post about 47-day certificates: This perfectly captures our collective delusion that SSL certificate revocation works. You click a button, the certificate stops working. And why wouldn’t we believe that? Every CA has a big “Revoke Certificate” button right there in the dashboard. It must do something, right? Here’s the dirty truth: most revoked certificates keep working.