Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Windows Security Event Collection for Microsoft Sentinel with Datastream

Collecting Windows Security Events has always been a necessary but difficult job. Traditional methods depend on third-party collectors that must be installed, configured, and constantly maintained. They break, they lag behind updates, and they create unnecessary operational work. At the same time, they often flood Microsoft Sentinel with redundant or irrelevant data, driving up costs and slowing down investigations.

The inadequate guide to Rails security

If you're like me, you got into this business because you love building awesome apps. If you've been in the development space long enough, you'll eventually have to do work on those awesome apps that doesn't feel so awesome. Security can be one of those things. Taking Rails security seriously is important, even though the Rails framework does much of the heavy lifting. Before we get too deep into the details of Ruby on Rails security, let's take a second to reflect on the good times. ...

Secure Streamlit app deployment with AWS Cognito, Streamlit, and CircleCI

As you develop internal tools or public-facing data applications, implementing authentication mechanisms becomes essential. Without authentication, you risk exposing sensitive information or allowing unauthorized access. Fortunately, integrating secure user access does not have to be complex. AWS Cognito provides a straightforward way to handle authentication, user management, and access control across multiple identity providers.

Why security should be non-negotiable in free business email

In today's fast-moving digital world, small businesses rely heavily on free email services to operate efficiently. Whether it's communicating with clients, managing orders, or coordinating teams, email remains a cornerstone of daily activity. While the convenience and zero cost of many platforms are tempting, overlooking security can have serious and lasting consequences.

Hard Drive Security Starts With Your Staff: Training That Protects, Sells, and Scales

Selling used hard drives doesn't start with wiping software, it starts with people. Every drive your company disposes of passes through human hands, which means training is your first and strongest safeguard. Poor handling opens the door to data leaks, compliance failures, and revenue loss. This article strips away the fluff and shows you what matters: building a training system that's practical, repeatable, and aligned with real business needs. From electrostatic discharge to chain-of-custody documentation, each step depends on your team. Get training wrong, and everything else falls apart.