Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

OWASP CI/CD Part 6: Insufficient Credential Hygiene

This post, part six of our OWASP CI/CD Top 10 series, looks at some of the common risks associated with Insufficient Credential Hygiene. By better understanding the flaws that affect credential hygiene, we can better understand how even the most sophisticated pipelines were compromised.

DevEx Unpacked 001 - Scaling Secure Software with Alison Sickelka

Episode 001: In this inaugural episode of DevEx Unpacked, host Alan Carson sits down with Alison Sickelka, VP of Product at Cloudsmith, for a deep dive into the evolution of software supply chain security. Alison shares her journey from journalism to product leadership, the unique talent landscape in Belfast, and how Cloudsmith is pioneering secure artifact management. Learn how Cloudsmith's Enterprise Policy Management is shaping compliance strategies, why SBOMs are crucial, and where AI fits in a secure DevOps future.

The Mindset Shift: IT Operations to Security - SolarWinds TechPod 099

In this episode, hosts Sean Sebring and Chrystal Taylor engage with actual rock star Chris Greer, a Security Engineering Manager at SolarWinds, to explore the multifaceted world of cybersecurity. Chris shares his unconventional journey from being a musician to entering the IT field, emphasizing the importance of certifications and the mindset shift required when transitioning from IT operations to security.

Zero Trust for Compliance: How Kosli Helps Engineers Automate the Paperwork

Engineers didn’t sign up to fill out forms, attend CAB meetings, or screenshot deployments. Yet that’s the reality of compliance in many organizations. In this video, Mike Long (CEO & Co-founder, Kosli) explains how Kosli helps software engineers eliminate the repetitive, meaningless tasks of traditional compliance — and replaces them with something automated, provable, and secure. Video Timeline.

The Full Picture of Software Delivery: How Kosli Connects Every Change to Its Origin

Software engineers don’t need more dashboards or forms. They need a reliable record of what actually happened in their systems—and how it ties back to the code. In this video, Mike Long (CEO & Co-founder, Kosli) explains how Kosli records every event in your SDLC and connects it to every system change. This gives you a full, auditable view of software delivery—from code to production.

Attack Surface Visibility: Research Uncovers Critical Security Blind Spots

You can’t fix what you don’t know is broken. Proactive attack surface management begins with total attack surface visibility, but persistent cybersecurity data blind spots leave organizations vulnerable. Ivanti’s 2025 State of Cybersecurity Report finds that siloed and inaccessible data limits visibility into threats and impedes security efforts and response times.

Heavy Equipment Selection Strategies: Industrial Project Cost Optimization From An Asset Management Perspective

In today's context of rapid development of manufacturing and engineering projects, heavy machinery plays a pivotal role as one of the key assets on industrial sites. Whether it is structural lifting, automated production line support, or warehousing and loading and unloading operations, the rationality of equipment selection is directly related to project costs, operational efficiency and long-term asset returns.

How to Recognize Fake Shops on the Internet

Shopping online requires careful consideration to ensure the reliability of the retailer. While some offers may appear attractive, it is important to assess a shop's legitimacy before making a purchase. Indicators of a genuine shop can include clear contact information, secure payment options, and consistent business practices. Conversely, suspiciously low prices, lack of company details, and poor website design can serve as warning signs of a potentially fraudulent site. By critically evaluating these factors, consumers can reduce the risk of encountering scams and make more informed decisions when shopping online.