Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Enhancing authentication security: Inside Microsoft's open source contribution to Grafana

When Microsoft engineers went looking for a modern visualization platform to help track critical signals and make quicker decisions, Grafana emerged as the clear favorite. But there was just one hitch: the available authentication methods didn’t quite meet their needs.

The Rising Role of AI in Modern Cybersecurity Service Delivery

Cybersecurity is today's most vital aspect of IT service delivery. As threats proliferate in scale, frequency, and sophistication, traditional cyber defense strategies struggle to be sufficient. This is why artificial intelligence (AI) is no longer a mere talking point but, rather a move toward needed operational reality.

OWASP CI/CD Part 9: Improper Artifact Integrity Validation

Improper artifact integrity validation is a critical vulnerability in CI/CD pipelines characterised by insufficient mechanisms to cryptographically verify the authenticity and integrity of code and build artifacts traversing the pipeline. When these controls are weak or absent, adversaries with access to any pipeline stage can inject malicious or tampered artifacts that appear legitimate, enabling undetected propagation through the pipeline and eventual deployment into production environments.

Integration Spotlight: Observo AI Supercharges SOCs on Elastic

Elastic is a go-to choice for organizations that want a powerful, flexible search and analytics engine without the cost overhead of traditional SIEM platforms. With its open-source foundation and customizable architecture, the Elastic (ELK) Stack—Elasticsearch, Logstash, and Kibana—has become a cornerstone for many modern observability and security workflows.

Security is a leading priority for 2025

The Cloudsmith 2025 Artifact Management Report offers timely insights into how engineering and DevOps teams are evolving their approach to software artifact management and software supply chain security. With supply chain attacks on the rise and Generative AI reshaping development practices, teams are reevaluating how they manage, secure, and scale their artifact repository infrastructure.

Raising the bar for automotive cybersecurity in open source - Canonical's ISO/SAE 21434 certification

Cybersecurity in the automotive world isn’t just a best practice anymore – it’s a regulatory imperative. With vehicles becoming software-defined platforms, connected to everything from mobile phones to cloud services, the attack surface has expanded dramatically. The cybersecurity risk is serious, and concrete. And with regulations like UNECE R155 making cybersecurity compliance mandatory, the automotive industry needs suppliers it can trust.

How to Block an External Attack with FortiGate and Progress Flowmon ADS

It’s a question we hear often - how do we use the Progress Flowmon solution to block an attack? Flowmon is not an inline appliance that stands in the path of inbound traffic, so we partner with third-party vendors who supply equipment such as firewalls or unified security gateways. In this post, we’re going to show you how to instruct Fortinet’s firewall FortiGate via Flowmon ADS to block traffic in response to a detected anomaly or attack.

SQL Prompt and other Tools now use a Dedicated Entra ID Application for Azure SQL Databases - Update Required

If you use Microsoft Entra ID to connect Redgate tools, such as SQL Prompt, to Azure SQL Databases, please update to the versions listed below before July 31, 2025. These versions use a new, dedicated Entra ID app to authenticate. Earlier versions use an authentication method that will no longer work after July 31st. This change only affects connections to Azure SQL Databases.

What CISOs Get Wrong About Vulnerability Scanning-and How Exposure Management Fixes It

Many CISOs managing critical infrastructure mistakenly treat vulnerability scanning as a complete solution for cyber risk reduction. While these scans are essential, relying on them alone leaves critical systems exposed to modern, sophisticated threats. Scans provide a snapshot in time-not a full picture of risk. As attackers become more agile and stealthy, this limited visibility creates blind spots, especially in high-risk industries like energy, healthcare, and telecommunications. That's where exposure management in cybersecurity steps in-not as a replacement, but as a vital evolution.

Addressing Security Concerns in Mobile Device Management with AirDroid Business

In this video, we will explore how AirDroid Business addresses security concerns in mobile device management, allowing IT professionals to manage multiple devices seamlessly. AirDroid Business offers robust features like remote lock, remote wipe, and application management to ensure your mobile data is secure. With efficient policy deployment, you can enforce security protocols effortlessly across all devices.