Operations | Monitoring | ITSM | DevOps | Cloud

How likely is a man-in-the-middle attack?

Security vendors love the man-in-the-middle attack. It’s the boogeyman of every TLS marketing page. Some shadowy figure intercepting your traffic, reading your secrets, stealing your data. A man-in-the-middle attack is when an attacker positions themselves between two parties on a network to intercept the traffic flowing between them. In the context of TLS, that means an attacker who can present a valid certificate can read everything in plaintext and proxy it on to the real server.

The limits of MCP and how Olly surpasses them

Model Context Protocol (MCP) servers act as adapter layers between clients and AI based workloads. MCP installation into an IDE, such as Cursor, brings a wealth of information directly into the developers primary tool, minimizing context switching and, especially in the world of observability, bringing telemetry closer to the code. MCP is not without its limits. These limits initially seem trivial, but in time, some of the inherent limitations to a basic MCP implementation become apparent.

A 4-Month Bug Fixed in <10 Minutes with Olly

In today’s highly interconnected systems, the subtle relationships between services are rarely obvious. Modern, complex architectures generate telemetry that functions less as “flashing signs” and more as faint “breadcrumbs” to be followed across a vast network of signals. In 2025, about two-thirds of outages involved third-party systems like cloud platforms and APIs.

Get Kafka-Nated S2E2: Viktor Kessler on Apache Iceberg, OSS, and Community

In this episode, we sit down with Viktor Kessler, co-founder of Vakamo, major contributor to Lakekeeper, and organiser of Apache Iceberg Meetup Europe, to explore the evolving world of Apache Iceberg. From architectural deep dives to open-source governance, Viktor shares insights from building an Iceberg REST catalog in Rust, launching a company around open data governance and growing the European Iceberg community from Dublin to Vilnius.

Icinga Notifications: Improving Alerting and Incident Workflows Webinar

Modern monitoring is not just about alerting, it’s about reducing noise, protecting on-call engineers from burnout, and improving incident MTTR through context-aware workflows. Icinga Notifications helps teams achieve just that with configurable, extensible alert processing built for scale. This webinar was held on February 17, 2026. We dive into the brand-new Icinga Notifications capabilities, a modern approach to alerting and incident workflows tailored for complex, dynamic infrastructures.

Why Nexthink Intelligence Is a Game-Changer for IT Teams

Nexthink Intelligence transforms digital employee experience (DEX) for modern enterprises. Learn how IT teams can leverage real-time analytics, proactive insights, and automation to improve user productivity, troubleshoot issues fast, and deliver better workplace tech experiences. Learn more at nexthink.com.

DNS blocklist monitoring now available to all Oh Dear users

Your domain is on a spam blocklist. Password reset emails aren't arriving, order confirmations land in spam, and customers are complaining that "your site doesn't work." By the time you hear about it, the damage has been building for days. We've shipped DNS blocklist monitoring to catch this early. Oh Dear now checks your domain against 11 major blocklists and notifies you the moment you're listed, with direct links to get removed.

How to Relocate IT Assets With InvGate

IT asset relocation is the process of moving technology resources from one place or person to another, with zero gaps in custody, security, or records. Why does this matter? Because every move introduces risk. Without a clear asset relocation process, devices can go missing, records get outdated, and even chain of custody can become unreliable or fragmented, making it harder to prove who was responsible for the asset at each stage of its movement.