Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Lewis Pope- Threats and Solutions for MSPs Security

If Head Nerd Lewis Pope had a nickel for every time an MSP underestimated the cost of building an in house SOC he'd have... well practically enough money to build an in house SOC. Building a 24/7 SOC is costly—but there are other solutions. Adlumin an N-able company offers advanced security operations at scale for a predictable cost. Find out more on the Beyond the Horizons Podcast available on YouTube and Apple Podcasts!

How SSL Certificate Monitoring Ensures Brand Trust and Credibility

See that little padlock icon to the left of our URL in the address bar? That shows the website is protected by an SSL certificate. It's a great way to tell potential customers that your brand is trustworthy. But if you don't keep an eye on the status of your SSL certificates, there can be serious consequences for your website and your reputation. In this post, we'll explore how SSL certificate monitoring works, how it affects brand trust and credibility, and how to do it right.

Kosli Raises $10 Million Series A led by Deutsche Bank and Heavybit to Transform Software Delivery Governance.

We are delighted to announce that Kosli has raised $10 million in Series A funding. The round was led by Deutsche Bank’s Corporate Venture Capital (CVC) group, with participation from Heavybit, Defined Capital, Transpose Platform, and a number of angel investors. Alongside this funding milestone we are launching Kosli Enterprise, a new offering designed to meet the complex governance and compliance needs of large financial institutions.

How we implemented a release/promotion workflow with a single approval, using Kosli

A feature we often get asked about at Kosli is whether we can help support a release/promotion workflow: a workflow that deploys a known set of Artifacts from one runtime environment (eg beta/staging) into another runtime environment (eg production), typically in parallel. The simple answer is we can help, and in this blog we show the release workflow in the Kosli cyber-dojo demo project (an open sourced application for practising TDD from your browser).

Cloud migration security: Risks, strategies, and best practices

Whether you’re migrating from on-premises to the cloud, between cloud providers, or to more advanced cloud architectures, each path shares common security challenges that must be addressed head-on. With the right approach, you can actually enhance your security posture during migration. In this article, we'll dig into practical approaches to cloud migration security, covering everything from initial planning to post-migration maintenance.

Observo AI + AWS Security Lake: Smarter, Cost-Efficient Security Data

Security operations teams are drowning in data. The rapid increase in security events, logs, and observability metrics makes it increasingly difficult to detect threats effectively. Data volume growth leads to high storage and processing costs, inefficient threat detection, and difficulty in extracting actionable insights from noisy datasets.

Supply Chain Security: Leveraging NDR to Combat Cyberthreats

Supply chains are crucial to business operations. It’s essential to verify that the connections required for them to operate don’t provide an opaque pathway for cybercriminals to exploit. This makes supply chain security a critical concern for organizations everywhere. The criminals determined to breach security and establish a persistent presence on networks are increasingly targeting vulnerabilities in supply chains. Through a single entry point, they can compromise multiple organizations.