Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Cove Data Protection Feature Focus: Critical Configuration Changes

Cove 26.2 delivers Critical Configuration Changes, the second feature in our Anomaly Detection story. This feature allows users to create event-based alerts for indicators of compromise in their backup policies, such as changed retention schedules, modified backup profiles, or deleted devices. With real-time visibility into these changes, users can take just-in-time action to resolve them before recovery efforts are impacted. In this video, we walk through how to create your first notification and outline the main use cases this feature supports.

Trusted Ownership: How Ivanti Application Control scales beyond allowlisting

Application control is one of those security topics where many people carry old assumptions. Traditional allowlisting feels safe but quickly becomes a maintenance burden. Blocklisting feels reactive and incomplete. And while tools like Microsoft AppLocker led many to believe that strict allowlisting is the gold standard, modern attacks have proven otherwise. Attackers increasingly rely on legitimate, signed tools — used in the wrong context — to bypass list-based controls entirely.

Best Website Monitoring Tools for Compliance and Security in 2026

Compliance audits used to be annual fire drills. Teams would scramble for weeks gathering screenshots, pulling logs, and hoping nothing slipped through the cracks. That approach no longer works when regulations like GDPR and HIPAA require continuous documentation and real-time evidence of security controls. Website monitoring tools designed for compliance have evolved to address this reality, automating evidence collection and flagging issues before auditors ever arrive.

Is Terabox Safe in 2026? Security Risks, Data Privacy Concerns, and Safer Cloud Storage Alternatives

Cloud storage platforms have become essential for individuals, startups, and enterprises alike. From backing up photos and documents to sharing large files across teams, services like Terabox promise convenience, massive free storage, and cross-device accessibility. However, in 2026, users are asking a more important question: Is Terabox truly safe?

Card Payments Without Fear: A Deep Dive into Tokenization & PCI Compliance

Buying something online might feel instant, but behind the scenes there's a whole variety of security checks designed to keep your card data invisible. Alexander Rumyantsev, a software engineer with deep experience in financial systems, walks us through how tokenization makes this possible, and why it's reshaping how product teams build payments.

The Hidden Cost of SaaS Sprawl: When Custom Development Makes More Sense

The average enterprise now spends $55.7 million on SaaS annually, an 8% jump from last year alone. Yet here is the uncomfortable truth: a significant chunk of that money is being quietly wasted on tools that overlap, go unused, or simply do not fit the way teams actually work. SaaS sprawl has become one of the most expensive and least visible problems in modern IT. And for a growing number of organizations, the answer is not another subscription. It is custom-built software designed around the way their business actually operates.

Secure by Design : Defend against AI-driven threats

After several zero-day attacks on leading security vendors that left the industry reeling in 2024 and 2025, Ivanti redoubled our commitment to transparency, product development that prioritizes security and community awareness. The attacks galvanized our Secure by Design framework so that we could accelerate our transformation to kernel-level security — compressing a three-year roadmap into just 18 months.

The Grafana Cloud identity blueprint: balancing security and scale

If you've ever rolled out Grafana Cloud to a growing engineering organization, this pattern may sound familiar: Everything feels simple at first. You invite a few teammates, give them access, and dashboards start appearing. Then the team grows. Then the number of stacks grows. Over time, a model that once felt fast and empowering starts to feel risky, difficult to understand, and even harder to undo. This post is about avoiding that moment.