Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Unpatchable Vulnerabilities: Key Risk Mitigation Strategies

Wouldn’t it be great if every vulnerability had a fix waiting in the wings? If patching were always fast, easy, and complete? That’s not the world we live in. Some vulnerabilities can’t be patched at all. Others are buried in systems or services you don’t fully control. And the longer your focus stays limited to internal infrastructure, the more risk slips through the cracks.

The role of CMDB in breaking down silos between IT and Security

The session highlights the importance of a well-structured Configuration Management Database (CMDB) in managing IT resources and ensuring compliance. It discusses the need for collaboration between IT and security teams to address vulnerabilities and improve incident response. The current cybersecurity landscape, including ransomware threats and data silos, is examined. Integrating CMDB with security tools is emphasized to strengthen security posture and meet governance requirements.

10 Best Log Monitoring Tools

Log monitoring stands as the backbone of resilient, secure, and high-performing digital operations. Every digital service, application, cloud platform, and network device leaves behind a trail of log files, containing raw, unstructured data that chronicles system events, user actions, errors, security activities, and business transactions. For organizations striving to achieve operational excellence, these logs are more than archives; they're the heartbeat of every mission-critical system.

Onboarding Microsoft Sentinel data lake with DataStream

Modern security operations teams face an overwhelming challenge: a rapidly growing volume of logs, alerts, and telemetry from cloud services, on-premises infrastructure, and third-party security tools. Traditional SIEM platforms often struggle to scale cost-effectively and provide the agility needed for advanced analytics and threat hunting.

SOC 2 Type 2: Netdata's Security Controls Validated Over Time

We’re excited to share that Netdata has successfully achieved SOC 2 Type 2 attestation. Following a five-month audit conducted by Sensiba LLP, we can now confirm that our security controls work consistently in practice. The audit covered the period from April 1 to August 31, 2025, and tested whether our controls operated effectively throughout that entire timeframe.

25 Sumo Logic updates to better monitor and secure your Azure environments

If you manage workloads across multiple clouds, you know how easy it is for critical alerts or performance issues to get lost in the noise. Switching between consoles, correlating logs, and tracking metrics across platforms can slow down troubleshooting, delaying incident resolution and increasing risk of missing critical alerts.

Breaking Down the Exposure Management Maturity Model

Register for the next webinar. The Exposure Management Maturity Model is crucial for effective vulnerability management. Organizations face challenges like limited attack surface understanding and the need for better collaboration between security and IT teams. Defining a risk appetite helps prioritize vulnerabilities, while asset visibility and classification identify critical assets. The session emphasizes business-driven vulnerability prioritization and operational remediation strategies, concluding with self-assessment opportunities and the development of risk-based KPIs.

How NRP Scales Global Scientific Research with Calico

The National Research Platform (NRP) operates a globally distributed, high-performance computing and networking environment, with an average of 15,000 pods across 450 nodes supporting more than 3,000 scientific project namespaces. With its head node in San Diego, NRP connects research institutions and data centers worldwide via links ranging from 10 to 400 Gbps, serving more than 5,000 users in 70+ locations.