Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The Shift Toward Contactless, Tech-Powered Storage Solutions

Storage solutions are becoming more responsive to the demands of an increasingly digital and contactless world. From self-service entry to smart security capability, technology is transforming the manner in which people store and manage their belongings. Not only are such innovations improving convenience, but safety and efficiency for both providers and customers as well.

400 Million Reasons Hackers Will Target Microsoft Again...

Yesterday, like many others in the tech community, I found myself pausing to fully grasp the implications of the Microsoft SharePoint hack. As one of the most widely adopted document management and collaboration platforms globally, SharePoint’s compromise inevitably sends ripples of concern through businesses everywhere. This news reminded me of a conversation I had just last week with an enterprise customer. We were discussing how one might approach cybersecurity from a hacker’s perspective.

HAProxy Enterprise WAF protects against Microsoft SharePoint CVE-2025-53770 / CVE-2025-53771

Critical vulnerabilities in Microsoft SharePoint (CVE-2025-53770 and CVE-2025-53771) are currently being exploited in the wild. Disclosed on July 19, 2025, these vulnerabilities have CVSS scores of 9.8 and 7.1 respectively, indicating severe and high risk. CVE-2025-53770 affects on-premises Microsoft SharePoint Servers, allowing unauthorized attackers to execute code over a network. CVE-2025-53771 affects Microsoft Office SharePoint, allowing authorized attackers to perform spoofing over a network.
Sponsored Post

Atlassian Jira Monitoring on Microsoft SCOM

As part of a customer project, we developed a custom Jira Management Pack for Microsoft System Center Operations Manager (SCOM). This tailored solution enables IT operations teams to monitor key performance and health metrics of Jira environments, ensuring planning and bug-tracking platforms remain available and performant. With this Use Case paper, we want to share our knowledge with the SCOM Community to highlight the possibilities of advanced monitoring on Microsoft SCOM, helping teams get better in their day-to-day tasks.
Sponsored Post

Streamlining multi-cloud complexity with unified observability

A wave of businesses are embracing multi-cloud strategies to gain flexibility and scalability. By combining on-premises infrastructure, private clouds, and public platforms like AWS, Azure, and Google Cloud Platform (GCP), IT teams can experiment, deploy, transform, and improve their IT applications significantly. On the down side, this modern IT approach of employing multiple clouds (in both public and private forms) also brings significant complexity, making it challenging to monitor systems, control costs, and secure environments. There are just too many threads to track and tie together to ensure a taut IT fabric.

Secure and Streamline Your Global Workforce with Ivanti's AI-Powered IT & Security Platform

Revolutionizing IT & Security: Empower Your Workforce with Ivanti’s End-to-End AI Platform Dive into the modern workplace, where complexity and security threats are on the rise. See how Ivanti’s AI-powered IT and Security platform is changing the game by managing, automating, and protecting every device on your network, while keeping your mobile, global workforce in sync and productive. Learn how Ivanti unifies your technology ecosystem, supercharges your team’s impact, and empowers them to take on bigger challenges.

Unleashing Protective DNS: The First Line of Cyber Defense You're Still Underestimating

Many cyber threats - like phishing, ransomware, and shadow IT - start at the domain layer. But too many security stacks only respond once the damage is done. In this on-demand webinar, Mikey Pruitt, Partner Evangelist at DNSFilter, shares insights, practical examples, and a live demo to show why DNS-layer protection is no longer optional - especially for MSPs and IT teams. Watch as Mikey breaks down.

Inside Our Security Masterclasses: Practical Insights for Cyber Resilience and Identity Protection

Explore an overview of our Security Masterclass series led by Stefanie Hammond, designed to help MSPs and IT professionals understand today’s evolving cyber threats and how to address them effectively. This video highlights two key sessions: Ideal for teams looking to deepen their cybersecurity knowledge or organizations aiming to enhance their security offerings with clear, practical guidance.

Threat Hunting Explained: See It in Action, Learn How It Works

Most IT and security professionals have heard of threat hunting – but few have seen it in action or fully understand how it works in the real world. That’s about to change. In this on demand webinar, Jim Waggoner and Kevin O’Connor guide you through a hands-on threat hunting session, showing how they identify, investigate, and surface hidden threats across cloud and endpoint environments. You’ll learn.