Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Designing Secure Healthtech Systems for Long-Term Patient Trust

Digital transformation in healthcare has accelerated rapidly, bringing an influx of connected platforms, from electronic health records and patient portals to wearable diagnostics and telemedicine tools. As more patients interact with healthcare systems through digital interfaces, the stakes have risen dramatically. In this high-trust environment, cybersecurity is a core component of patient confidence and operational integrity.

Cybersecurity Challenges in Automotive Manufacturing

Ever been told to "just install the update" on a system that can't afford a single minute of downtime? Then you get it. In automotive manufacturing, the reality on the floor often differs from what IT expects. Security patches, network scans, and monitoring tools sound good in a meeting. However, when your equipment is tied to real-time processes, even a minor change can cause significant problems.

How Continuous Threat Simulation is Reshaping IT Incident Response Playbooks

Imagine this: It's 2 a.m. and your phone buzzes with an urgent alert-your company's systems are under attack. The team scrambles to follow the incident response playbook, but something's off. The scenario unfolding doesn't quite match the plan. Key people aren't sure of their roles. Hours go by. The damage grows. This kind of chaos is all too common, and it highlights a major problem: traditional incident response playbooks just aren't built for today's fast-changing threat landscape.

Introducing Environment Policy- Gain Unified Control Over Compliance Requirements Across Your Runtime Environments

In modern software development, different environments often have different compliance requirements. Your development environment might allow more flexibility, while production demands strict controls around security scans, testing, and code review. Environment Policy helps you codify these requirements and enforce them consistently.

OWASP CI/CD Part 6: Insufficient Credential Hygiene

This post, part six of our OWASP CI/CD Top 10 series, looks at some of the common risks associated with Insufficient Credential Hygiene. By better understanding the flaws that affect credential hygiene, we can better understand how even the most sophisticated pipelines were compromised.

DevEx Unpacked 001 - Scaling Secure Software with Alison Sickelka

Episode 001: In this inaugural episode of DevEx Unpacked, host Alan Carson sits down with Alison Sickelka, VP of Product at Cloudsmith, for a deep dive into the evolution of software supply chain security. Alison shares her journey from journalism to product leadership, the unique talent landscape in Belfast, and how Cloudsmith is pioneering secure artifact management. Learn how Cloudsmith's Enterprise Policy Management is shaping compliance strategies, why SBOMs are crucial, and where AI fits in a secure DevOps future.

The Mindset Shift: IT Operations to Security - SolarWinds TechPod 099

In this episode, hosts Sean Sebring and Chrystal Taylor engage with actual rock star Chris Greer, a Security Engineering Manager at SolarWinds, to explore the multifaceted world of cybersecurity. Chris shares his unconventional journey from being a musician to entering the IT field, emphasizing the importance of certifications and the mindset shift required when transitioning from IT operations to security.

Zero Trust for Compliance: How Kosli Helps Engineers Automate the Paperwork

Engineers didn’t sign up to fill out forms, attend CAB meetings, or screenshot deployments. Yet that’s the reality of compliance in many organizations. In this video, Mike Long (CEO & Co-founder, Kosli) explains how Kosli helps software engineers eliminate the repetitive, meaningless tasks of traditional compliance — and replaces them with something automated, provable, and secure. Video Timeline.