Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Should you still pay for SSL certificates?

There’s a particular flavor of skepticism that shows up whenever someone suggests using Let’s Encrypt. The security team crosses their arms. “Free certificates? For production? We’re a serious organization. We use Sectigo.” I get it. You’ve been buying certificates from the same vendors for twenty years. They send you invoices, you pay them, certificates appear. It feels responsible, and free feels like a trap. But is it?

The Ultimate Small Office Downtime Prevention Checklist

We've all been there. It is 2:00 PM on a Tuesday, one hour to the deadline, and all of a sudden the internet goes dead. Or the server freezes. Or that critical piece of software decides this is the right time to insist on an update which it cannot perform. What follows is not quietness, but the costly sound of productivity grinding to a halt.

Cloud Strategy for 2026: the Year of Repatriation, Resilience, and Regional Rebalancing

This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing focus on data sovereignty. These challenges have set the stage for 2026 to be the year of repatriation, resilience, and regional rebalancing. Here, Rob Coupland, Chief Executive Officer at Pulsant, offers his insights.

Types of Cyber Security Attacks

Damaging cyber attacks are a rising concern as organizations increasingly rely on digital technology for managing sensitive data and running core business operations. While technology can increase business efficiency, without security measures in place, a digital-first approach can end up introducing vulnerabilities and putting data at risk.

CFEngine 3.27 LTS released - Exploration

Today, we are pleased to announce the release of CFEngine 3.27.0! The code word for this release is exploration. This release also marks an important event, the beginning of the 3.27 LTS series, which will be supported for 3 years. Several new features have been added since the release of CFEngine 3.24 LTS, in the form of non-LTS releases.

What the Latest Google "AI Mode" Means for Users Who Care about Privacy and Better Experiences

When Google introduced its AI highlights above the main search results, we thought that was all the company would push to prove its determination to turn traditional Google Search, praised by businesses for expansive SEO opportunities, into an AI-powered experience. But if you live in the U.S. and have recently paid attention to the Google homepage, there's a new button called "AI Mode." Well, it turns out the company is still working hard not to lose its dominance to competitors.

VirtualMetric DataStream + Amazon Security Lake: OCSF-Ready Security Data Without Custom Pipelines

Security teams are increasingly turning to Amazon Security Lake to consolidate security telemetry across cloud, network, and on-prem environments. Security Lake provides a unified, OCSF-based data repository that powers analytics, threat hunting, and machine learning across AWS services and third-party tools. But to take advantage of Security Lake’s capabilities, organizations must deliver clean, normalized, OCSF-compliant data, and this is where challenges arise.

Inside Qovery's security architecture: how we secure your cloud & Kubernetes infrastructure

Discover how Qovery bridges the gap between developers and infrastructure with a "security by design" approach. From federated identities and unique encryption keys to real-time audit logs and SOC2 Type 2 certification - see how we protect your data while eliminating vendor lock-in.

SSH Check Overview

In this video, learn how to set up and configure SSH checks using Uptime.com. We discuss the frequency options, the importance of Secure Shell (SSH) for secure data communication, and step-by-step instructions for creating a new SSH check in your account. Discover how to set check intervals, configure alert contacts, specify monitoring locations, and ensure your probe servers are whitelisted. Perfect for ensuring your server's remote login capabilities are continuously monitored and secure.

Key Insights from the 2025 GigaOm Radar for Container Networking

In 2025, as modern applications became ever more distributed and the use of Kubernetes continued to proliferate, the role of container networking was critical. Today’s enterprises demand networking solutions that can scale, secure, and connect services reliably, whether those services run across multiple clouds, hybrid environments, or on-premises clusters.