Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Six Tips For a Safe Internet Browsing On Your Phone

As the world becomes more digitalized, people's dependence on the internet has also increased. Unsurprisingly, in the 21st century, individuals need the internet for the most pivotal and fundamental tasks. Unfortunately, with the increasing use of the internet, there has also been a rise in cybercrimes.

Export env0 Log Data to SIEM and Monitoring Platforms [2026]

Every time Terraform runs a plan, every time an environment is deployed, every time a variable is changed, env zero generates a record. env zero log forwarding sends that record to your existing SIEM or observability platform automatically. For most teams without it configured, that record lives inside env zero and nowhere else.

Resolve's Agents of IT podcast - Ep. 16 - Can AI Fix Broken Work Without Breaking Security?

In this episode of Agents of IT, host Ari Stowe sits down with producer Ian Coppock for a fast-paced, no-filter discussion on one of the hottest topics in enterprise tech: AI, security, and the reality of modern work. Is AI introducing new security risks, or just exposing the ones that were already there? The answer is both. From overprivileged access to machine identities, Ari and Ian break down what’s actually changing and what isn’t. They challenge the idea that AI alone will fix broken workflows and explore why intentional design, guardrails, and orchestration matter more than ever.

How Modern IT Solutions Secure Business Operations and Drive Scalability

In today's fast-paced digital economy, business growth is heavily dependent on technological capability. However, as organisations expand their digital footprint, they simultaneously widen their attack surface. Scaling operations without a robust security framework often leaves companies vulnerable to severe operational disruptions, regulatory fines, and reputational damage. For business leaders, the challenge lies in deploying infrastructure that supports rapid growth while maintaining airtight security across all digital assets.

CertKit is out of beta

CertKit is officially out of beta. We started building CertKit a year ago, and since then over 600 people signed up, issued certificates, and deployed to their infrastructure. Several are running it as their production certificate management platform right now. We built a lot during the beta. Some of it we planned: SSO, team management, alerting. Other things, users had to beat into us. The Keystore came from enterprise security requirements to keep private keys in house.

Using Open Policy Agent (OPA) with Terraform: Tutorial and Examples [2026]

Infrastructure as Code (IaC) solves the provisioning problem. It doesn't solve the governance problem. You can version your Terraform configuration, run it in a pipeline, review every pull request — and still deploy an S3 bucket with public access, a VM with no encryption, or a resource that exceeds your cost budget. Nothing in the standard IaC workflow checks for those things. The reviewer has to know what to look for. And they won't catch it every time. Policy as Code changes that.

Kosli and Adaptavist Partner to Automate Governance for AI driven Software Delivery

Today, Kosli and Adaptavist announce a strategic partnership to help regulated enterprises automate governance for AI driven software delivery - making it automated, continuous, and evidence-driven rather than a manual checkpoint that sits apart from DevOps and CI/CD. Adaptavist brings deep enterprise DevOps transformation expertise: assessment and strategy, DevSecOps integration, developer experience, and implementation across Atlassian, GitLab, and AWS.

IREX Enhances FireTrack AI Module for Faster, More Accurate Fire Detection

WASHINGTON, DC - IREX, a global developer of ethical AI and intelligent video analytics, has announced a significant upgrade to its FireTrack fire and smoke detection module, expanding its capabilities across a wide range of environments. As outlined in an article on TNW, the updated solution is designed to work seamlessly with existing camera infrastructure, eliminating the need for additional hardware while extending its use to critical infrastructure, public institutions, residential and commercial properties, and natural environments such as parks and forests.

Why Cloud and DevOps Practices Matter to Prop Trading Firms

The financial industry has always been driven by speed, precision, and the ability to act on information faster than anyone else. In recent years, prop trading firms have found themselves at a crossroads where traditional infrastructure simply cannot keep up with the demands of modern markets. Cloud computing and DevOps practices have emerged as two of the most transformative forces reshaping how trading operations are built, managed, and scaled. Understanding why these technologies matter is not just useful for tech teams, it is essential knowledge for anyone involved in or curious about the future of high-performance trading.

Identify Weaknesses like a Ninja

Most IT teams find themselves playing catch up when dealing with vulnerabilities within their IT environments. In this stream, Director of Community, Jonathan Crowe joined by Director of Product Management, Greg Thomas and Sr. Product Marketing Manager, Mark Bermingham, will discuss how to be proactive and build a vulnerability management process that reduces risks and costs. What you’ll learn.