Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introduction to Puppet Security Compliance Enforcement

Take enterprise compliance to the next level with Puppet Security Compliance Enforcement. This video demonstrates how to shift from reactive to proactive compliance, automating security standards across Puppet Enterprise and Puppet Core environments. Discover how to implement CIS benchmarks with ease, achieve consistent compliance, and reduce risk across your Linux and Windows infrastructure with tailored configurations.

What Does Proactive Cybersecurity Really Mean? Measures to Protect Your Organization

Ivanti’s 2025 State of Cybersecurity Report found something utterly unsurprising: that organizations report a significant preparedness gap (that is, the gap between the perceived threat level and their degree of preparedness) across every threat vector and vulnerability we asked about. While security teams rightfully devote resources to building resilience so they can swiftly respond to and recover from attacks, closing those preparedness gaps requires proactive cybersecurity measures.

The MSP's DNS Security Checklist

DNS is one of the most important and most overlooked layers in your client’s infrastructure. As an MSP, you’re often the one who gets blamed when something breaks—whether you control the DNS or not. And while many DNS problems are silent, their consequences are loud: email failures, website outages, and frustrated clients. This DNS security checklist will help you proactively identify and fix DNS risks across all your client domains.

Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

The rate at which vulnerabilities are being exploited is on the rise. The VulnCheck company, which specializes in vulnerability intelligence, found that in Q1 2025, 28.3% of vulnerabilities were exploited within 1 day of CVE disclosure. Keeping your systems up to date is more important than ever. The reality is that many security teams are running scans and then exporting to giant spreadsheets, which are “tossed over the wall” to the Operations team with little context.

Introducing Cribl Guard

Does sensitive data flowing through your network feel like a ticking time bomb? Well, it just might be. Legal mandates, security frameworks, and customer expectations have made the stakes higher than ever. One leaked spreadsheet of personally identifiable information (PII) can wipe out years of customer trust, rack up regulatory fines, and invite ransomware actors to your doorstep.

Tracking Safety: The Role of Mobile Monitoring in Protecting Vulnerable Family Members

It's never been easier to stay connected with the people you care about. Thanks to smartphones and GPS technology, families now have powerful tools to protect their loved ones-whether they're across town or across the country. But these same tools raise important questions: how much should we monitor, and when is it necessary? Let's explore how mobile tracking can help safeguard the most vulnerable members of our families-from kids to grandparents-and how to use it responsibly.

Vibe Coded Software Cybersecurity Risks and How To Respond

Generative AI has enabled anyone in any company to become a software creator, thereby creating a new generation of vibe-coded cybersecurity risks. The rise of "vibe coding" (building applications on the fly by describing what's needed in natural language) has introduced an entirely new class of security blind spots when these tools plug into your systems or are installed in your environment. Here's what vibe coding cybersecurity risks look like in your environment and what you need to do to stop them.

Bridging the Gap: 3 Practical Strategies to Align Security and Operations in DevOps

The gap between security operations and IT operations poses significant risk. It’s increasingly clear that DevOps leaders, IT managers, and enterprise teams face an uphill battle to manage growing threat complexity, endless patches, and compliance requirements while operating in silos. Bridging this gap is essential to effectively manage risks and enhance operational efficiency.

Securing the Invisible: Why Ambient AI Needs Next-Gen Security

If, like me, you’re continuously striving to keep pace with the ever-evolving world of artificial intelligence, you’re probably hearing a lot about how Ambient AI is poised to dominate discussions and developments throughout the second half of 2025. Ambient AI refers to artificial intelligence systems that operate unobtrusively in the background of our daily environments, constantly sensing, analyzing, and responding to various inputs without explicit human interaction.