Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Top Browser Extensions to Enhance Your Online Privacy

In the era of digitalization, it is more important than ever to preserve online privacy. In the age of growing cyber threats, data breaches, and intrusive tracking technologies, protecting your personal data when using the internet is a priority. Browser extensions that are meant to protect your data, block trackers, and increase security are one of the best options to enhance your online privacy. This article discusses some of the most useful browser extensions to boost your online privacy, and gives you factual and interesting information to make an informed decision.

Inside a Cybersecurity War Room - SolarWinds TechPod 101

It's CSOC o'clock! In this episode, we dive into the high-stakes world of cyber defense with the manager of cybersecurity operations at a critical infrastructure organization. From ransomware threats and zero-day exploits to the rise of nation-state-backed Advanced Persistent Threats (APTs), our guest reveals how security teams manage 24/7 threats, the mindset it takes to thrive in cybersecurity, and why community collaboration is becoming essential in cyber warfare.

How Top SOCs Automate Detection of Evasive Phishing Attacks

Phishing is no longer sloppy or easy to spot. Modern attacks are clean, targeted, and sold as full-service phishing kits. They mimic trusted brands, use CAPTCHAs to block scanners, and quietly steal credentials behind polished, convincing pages. For SOC teams, this creates a serious problem. Traditional detection methods often miss these threats entirely, until the real damage is done. But leading SOCs have found a way to fight back.

Enhancing Digital Transactions through Localized Access Points

You know that feeling when you're waiting for a payment to clear, refreshing your banking app like it owes you an apology? Yeah-digital speed isn't always as instant as we'd like. That's why there's something oddly reassuring about being able to physically walk somewhere, get your transaction handled, and walk out with proof in hand. In the age of near-invisible payments and cloud-based everything, localized access points-whether they're payment kiosks, verification hubs, or even a spot with a bitcoin ATM -are quietly reshaping how we interact with digital systems.

Why Software Companies Should Never Skip Over Physical Security

In the software industry, most conversations about security revolve around firewalls, encryption, multi-factor authentication, and patch management. While these digital measures are essential, physical security often gets left in the shadows. For many software companies, this oversight can be costly, not just financially, but in terms of trust, compliance, and operational continuity.

Stop Guessing with OAuth: Understanding CI/CD

OAuth 2.0 is the leading open authorization framework that enables secure delegated access to protected resources. From traditional web apps and browser-based apps to native apps and desktop applications, OAuth allows client apps to grant access on a user’s behalf without exposing login credentials, enabling powerful third-party applications, custom data flows, and powerful user experiences. However, while OAuth is secure, it’s not always fast.

A CISO's guide to Application Security best practices

When most people think about the most important ingredients of software, Application Security (AppSec) is unlikely to be at the top of the list… but it should be. Without AppSec, you face severe risks of data breaches, massive fines, enraged users, and severe financial losses.

#047 - Securing the Software Supply Chain and Kubernetes with Dustin Kirkland (Chainguard)

Meet Dustin Kirkland, VP of Engineering at Chainguard. Dustin shares his fascinating 26-year journey in the tech industry, from IBM and two stints at Canonical to roles at Google (working on GKE), Apex, and Goldman Sachs, eventually leading him back to engineering at Chainguard.