Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Regulatory Readiness: What Internal Teams Often Miss Without IT Consultancy

In today's connected economy, regulatory readiness isn't just about ticking boxes - it's about protecting business continuity, building trust, and avoiding costly penalties. Whether it's a supplier data breach or an unexpected audit, organisations must be able to demonstrate compliance with recognised standards like ISO 27001 and GDPR.

Implementing IT Access Management: A DevOps Operations Guide for Streamlined Security Integration

Effective IT access management in DevOps requires implementing automated controls that scale with development workflows while maintaining security principles throughout the entire software lifecycle.

GPT-OOS: A Secure Step Forward, But Not a Free Pass

The release of OpenAI’s new open-source model, GPT-OOS, has sparked a wave of excitement across the AI community. And rightly so. For organizations that want the benefits of generative AI without sending data out to the web, this is a compelling option. Running locally, GPT-OOS offers a level of privacy, control, and cost-efficiency that’s hard to ignore. It’s fast, lean and at least in its early benchmarks, surprisingly capable in coding, math, and STEM-heavy workloads.

Weaponized AI vs. AI Driven Security Posture Management: Why the Battle Starts in Misconfigurations

August 5, 2025, Las Vegas Black Hat 2025, Abnormal AI officially launched its Security Posture Management for Microsoft 365. This release marks a critical turning point. In an era where attackers weaponized AI to uncover and exploit misconfigured cloud environments at machine speed, reactive security simply can’t keep pace. Threat actors are now leveraging automated AI to scan systems, identify configuration drift, escalate privileges, and deploy zero‑day exploits in seconds.
Sponsored Post

AI realism (part one)

Emotions are running high about AI technologies. In this 2-parter, I do my best to make a rational case on the reality of AI, and how we can respond to it. This is part one; part two next week. We seem to be struggling to have pragmatic discussions about advancements in Artificial Intelligence. It's hard to hear calmer voices over the detractors and breathless enthusiasts. Today, I want to make a reasoned, evidence-based case for the potential of this technology, glance at present and future applications, and offer some practical examples for implementing AI within an organization.

New Feature - Vulnerable System Drivers Monitoring

Vulnerable system drivers continue to be a vector exploited by attackers to compromise systems. In eG Enterprise version 7.5 we added a number of periodic security checks to assist administrators proactively identify weaknesses, including vulnerable system drivers monitoring.This new capability is supported for a Windows OS, when using a VM agent for inside view monitoring and / or when monitoring an Azure Virtual Desktop session host.

Microsoft Office 365 Update and Linux Security Enhancements

Microsoft extends rollback support for Office 365 updates to two months and discloses a vulnerability without zero-day exploits. SQL updates now require specific version and driver fixes. Ivanti releases three security updates addressing 11 CVEs, while a partnership with Tuck Care improves Linux patching. Misconceptions about Linux security are addressed, emphasizing the need for regular updates to mitigate risks from notable CVEs across distributions.

Mobile Security Isn't a Nice-to-Have - It's an Absolute Must

Mobile Security Isn’t a Nice-to-Have — It’s an Absolute Must According to the Verizon’s 2024 Verizon Mobile Security Index Report, nearly 90% of organizations recognize the urgent need to take mobile security seriously. Are you one of them? From mobile phishing to smishing, vishing, quishing and zero-day threats, the mobile attack surface is bigger and more dangerous than ever. Cybercriminals are relentlessly targeting mobile devices as a gateway to your organization, making mobile security especially critical.