Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The AI Visibility Problem: When Speed Outruns Security

Harness surveyed 500 security practitioners and decision makers responsible for securing AI-native applications from the United States, UK, Germany, and France to share findings on global security practices. The State of AI-Native Application Security 2025 dives deep into AI visibility and the changing landscape of security vulnerabilities. If 2024 was the year AI started quietly showing up in our workflows, 2025 was the year it kicked the door down.

Protecting Sensitive Information in an Era of Digital Transformation

You might worry about keeping your personal or work data safe as more things move online. In 2023, over half of large companies reported some type of data breach. This blog will show simple ways to protect sensitive information using smart tools and habits. Start learning now to stay ahead of new digital threats!

SIEM Migration in 68 Days

In this session, we will discuss how the University of Pittsburgh was able to modernize their data processing strategy, migrate to a new SIEM solution, and avoid ballooning SIEM costs all within 68 days from the first install of a Cribl product. We will showcase how we were able to use Cribl's software to easily handle the following scenarios: 100% agent replacement and consolidation using Cribl Stream Workers and Edge.

Certificate revocation is broken but we pretend it works

Last week, someone commented on my post about 47-day certificates: This perfectly captures our collective delusion that SSL certificate revocation works. You click a button, the certificate stops working. And why wouldn’t we believe that? Every CA has a big “Revoke Certificate” button right there in the dashboard. It must do something, right? Here’s the dirty truth: most revoked certificates keep working.

5 Ways to Strengthen IT Governance Through Better AI Visibility

AI is transforming businesses fast, but most organizations are diving in without a clear view of what's actually running in their systems. That lack of visibility is more than a small oversight, it's a ticking time bomb. When you don't know which AI tools are active, it's nearly impossible to protect sensitive data, stay compliant, or manage costs effectively.

Secure, Smart and Always On: Why a GPS Tracker Is a Must Have Today

In a world where time is money, and security is non-negotiable, the ability to know where your assets are, how they're being used, and when they're vulnerable is no longer a luxury-it's essential. That's why investing in a high-quality GPS tracker is one of the smartest decisions you can make. At Trackershop, we offer a wide range of GPS trackers built to give you visibility, control and peace of mind-whether you're protecting a car, motorhome, trailer, machinery or even your loved ones.

Reimagining Network and Security Operations: How AI and Automation Are Transforming the Modern NOC & SOC

In today’s hyper-connected, always-on enterprise landscape, every second of downtime, every unnoticed anomaly, and every delayed response can have cascading business implications. Traditional Network and Security Operations Centers (NOCs and SOCs), built on manual triage and siloed data, were never designed for this pace or scale.

Latest Security Updates: Chrome, Firefox, Adobe, and Microsoft #patch

A Chrome vulnerability is identified, allowing for remote code execution. Mozilla updates Firefox and Thunderbird to fix vulnerabilities. Adobe addresses critical issues in Bridge, Animate, and Illustrator. Microsoft resolves multiple vulnerabilities in Windows 10 and 11, along with updates for Office 2016 and 2019. Exchange Server updates are released, with no known exploits, and the T Net framework receives a rare update for an encryption vulnerability.