Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introducing Atatus Sensitive Data Classifier

Your logs know too much. Every debug statement, every traced request, every APM span can carry the risk of capturing something they shouldn't. A customer email. A JWT token. A credit card number. An API key that was never meant to leave your payment service. It doesn't look like a breach. There's no alert. Your observability platform just quietly accumulates sensitive data like indexed, replicated, and accessible to every engineer with log query access.

The 2026 Automotive Security Testing Companies List

Modern vehicles ship with more software than a small airliner. A single mid-range car can run 100 million lines of code across dozens of electronic control units, talking over CAN, Ethernet, Bluetooth, Wi-Fi, cellular and increasingly UWB. From a cybersecurity point of view every one of those interfaces is a potential attack vector and every OEM, Tier 1 and fleet operator on the planet now has to prove, on paper, that they have tested their vehicle from a hackers perspective.

AI Governance: Why Businesses Need Control Over AI Systems and Data

As artificial intelligence becomes embedded in everyday business operations, the conversation is shifting from adoption to control. Companies are no longer asking whether to use AI-they are asking how to use it safely. This is where ai governance becomes critical. Organizations looking to protect sensitive data and ensure responsible AI usage are turning to advanced ai security solutions like iDox.ai, which help monitor, manage, and secure how data interacts with AI systems.

Snyk vulnerability compliance with kosli evaluate trail

Kosli recently released kosli evaluate trail, a command that evaluates selected attestations in a Kosli trail against a Rego policy file. We used it to build a complete and useful solution for tracking Snyk container vulnerabilities for cyber-dojo (an open-sourced browser based online tool for practising TDD which Kosli uses for demos). You’ll read about what we built, why we built it, how we tested it, and specifically.

Why Tech Businesses May Need Criminal Defense Representation

Running a technology firm brings unique hurdles that go far beyond standard business management. Founders often focus entirely on rapid scaling and innovative product design rather than hidden legal traps. A sudden investigation can disrupt standard operations overnight - often without any warning. Legal protection becomes necessary when automated software actions trigger unintended state or federal legal scrutiny.

The Importance of Time Synchronization in Windows Authentication

Kerberos is a secure network authentication protocol that allows users and systems to prove their identity over a network without sending passwords in plain text. It is widely used in enterprise environments (for example, in Windows domains) to enable single sign-on (SSO). At its core, Kerberos uses a trusted authority called the Key Distribution Center (KDC) to issue encrypted “tickets” that verify identity.

What a Modern Business Tech Stack Should Look Like

In today's fast digital market, the real question is not if your business needs tech, but which tech will help you move forward. A modern business tech stack is more than a pile of apps. It's a carefully chosen set of digital tools and systems (like programming languages, frameworks, databases, front-end and back-end tools, and APIs) that work together to run day-to-day operations, support new ideas, and help the business grow.

Why Document Workflows Break at the Security Layer

Document transmission has always been a quiet backbone of enterprise operations - moving contracts, patient records, legal filings, and financial data between departments, clients, and regulatory bodies. But as infrastructure modernizes, a persistent blind spot keeps surfacing: the handoff between document workflows and secure transmission channels remains fragile, especially when compliance requirements enter the picture.

Improvements to our status pages as we tackle a DDoS

The uptime & availability of our status pages hasn't been great these past few days. The root cause is a persistent and pretty aggressive DDoS attack targeted at our own status page, status.ohdear.app. As a result, the overload on our systems also affected all other status pages we host for clients. We're not yet at Github or Claude levels of uptime sadness, but this isn't acceptable to us. In this post, I'll share what's happening and what steps we've already taken.