Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

OWASP CI/CD Part 3: Dependency Chain Abuse

As more teams rely on public repositories in their software supply chain, the dependency chain has become both a critical foundation and a potential blind spot. Dependency chain abuse is not new, but a growing list of attack vectors - like typosquatting, dependency confusion, and now slopsquatting - means security leaders need to respond quickly as attackers adopt new techniques.

Building trust in SaaS: balancing security, audibility, and speed of innovation

SaaS is an important model that has changed how organizations manage digital tools. From local software installation to models capable of handling the entire operations. Despite the importance of SaaS in terms of promoting innovation, trust is very important when it comes to customers accepting decisions. SaaS providers see trust as a critical business feature, not just a technical concern. Customers now demand clear visibility into the storage and usage of data. This has made standard certification and trusted security a part of the acquisition process. Sometimes businesses refuse to use a SaaS feature that does not have clear agreements with security policies.
Featured Post

How to decide between cloud and on-premise monitoring

Application performance monitoring systems tend to be available in two modes: on-premise and cloud-based SaaS. Which is the "right" choice? Well, it depends on your situation, but overall cloud-based SaaS offerings have significant benefits when compared to on-premise. However, it's not always so simple. The right selection depends on the facts on the ground. Using my experience working for a large-scale cloud solutions department, I've put together some key things you'll want to consider before you make a decision, starting with some benefits and challenges.

All the Colors of Cyber Defense: Red, Blue, Purple Powered by Observo AI

Cybersecurity is no longer a collection of siloed strategies—it’s a coordinated, intelligence-driven discipline that demands speed, scale, and precision. To stay ahead of evolving threats, organizations must harness unified, data-centric defenses. Observo AI answers that call. This advanced, AI-powered data pipeline platform is purpose-built to optimize, enrich, and intelligently route telemetry across security and DevOps ecosystems.

Why Patching is Important: The Risks of Ignoring It & How to Stay Ahead of Patch Management This Year

Let's face it: no one likes patching. For some IT ops teams, it's such a burden that it's easy to forget why patching is important. Lots of teams put off patching until it's deemed absolutely necessary, like a vital app update or a piece of critical software going EOL. We all know ignoring patches, or letting them pile up, is a bad practice. Read this blog to remind yourself why patching is crucial, what can happen if you don't patch, and how to stop putting it off.

Database Protection Guide: Best Practices for Ensuring Database Security

These days, information has enormous power. If you have access to sensitive data, you can do anything with it. It all depends on your imagination. As we know, all data is stored in databases. The reputation, efficiency, and profitability of many companies often depend on the private information they collect and store in databases. One of the most dangerous things that can happen to your database is a data breach.

Why You Can't Afford to Ignore Software Supply Chain Attacks

Ivanti’s 2025 State of Cybersecurity Report revealed that just 1 in 3 organizations feel prepared to protect themselves from software supply chain threats. With attackers increasingly targeting third-party dependencies, supply chain attacks may become a painful Achilles heel for cybersecurity if organizations continue to overlook them.

Beyond the Horizon: Building Cyber Resiliency by Embracing the Inevitable

"Once you address the vulnerabilities you do know about, there will be more vulnerabilities you don't know about," In light of the recent cyberattacks making headlines the latest episode of Beyond the Horizons Podcast Lewis Pope explores how even if you think you're doing everything right, if you're preparing for the IF and not the WHEN you're not cyber resilient.