Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities

Why should you monitor PowerShell?…. PowerShell is a powerful automation tool, however its capabilities also make it a prime target for exploitation by cyber attackers. Implementing a robust, automated PowerShell monitoring solution is now essential to detect and prevent exploitation attacks before they compromise your systems. PowerShell is a powerful scripting tool that can automate tasks and manage systems, but its flexibility also makes it a target for abuse.

Microsoft Outlook rolls out stricter email authentication requirements for high-volume senders to enhance security

Microsoft Outlook.com (which includes hotmail.com, live.com, and outlook.com) is implementing new email authentication procedures in an attempt to improve email security and preserve customer confidence. These modifications, which came into effect on May 5, 2025, are intended especially for high-volume senders, or those who send more than 5,000 emails every day.

OpenAI's 'AI in the Enterprise' Report: A Must-Read - But One Crucial Piece Is Missing

We are standing at the threshold of one of the most transformative technological shifts in modern enterprise history. AI is no longer on the horizon – it’s here, it’s powerful, and it’s already reshaping the way businesses think about productivity, creativity, and competitive advantage. OpenAI’s recent report, ‘AI in the Enterprise‘, offers a concise and thoughtful roadmap for leaders seeking to implement AI within their organizations.

Package signing and verification

Disclaimer: This post focuses on Debian-based and Fedora\/RHEL-based distributions and packaging. Everybody using a GNU/Linux distribution most likely knows that packages used by the given distribution are somehow signed and such signatures are somehow verified. Usually, this knowledge comes with the first requirement to import some key when an extra package repository is being added to the system (the standard repositories of a distribution use keys that are present and trusted by default).

Securing the Software Supply Chain: Why It's More Important than Ever

The software supply chain has become the backbone of modern IT environments. It powers applications, underpins operational processes, and drives innovation within organizations across industries. Securing the software supply chain has moved from a peripheral concern to a central element of cybersecurity: The vast network of code, dependencies, integrations, and third-party tools that comprise the supply chain is increasingly under siege from cyber threats and at risk of exploitation.

The Rise of Remote-First Companies: What It Means for the Future of Work

Despite what you might have heard, remote work is still huge. Remote-first companies use remote working as the core of all their processes and operations, as opposed to remote-friendly teams that just use remote working as a perk to offer workers if they require it. The business world has seen a huge increase in remote working since COVID-19, which has led to companies needing to adapt or die.

Shut Down Cryptojackers and Strengthen Kubernetes Security with NeuVector

The threat landscape for cloud-native environments like Kubernetes is always on the move. Attackers continuously apply sophisticated techniques. Cryptojacking, the unauthorized use of computing resources to mine cryptocurrency, is a particularly concerning threat. Cryptojacking can lead to performance degradation, increased operational costs, and potential security breaches. Recent high-profile incidents underscore the importance of addressing these threats.

How to Strengthen Your SDLC Audit Trail with Improved Access Control in Kosli

Automating SDLC Governance is one of our key use cases. Kosli gathers all of the evidence your engineering teams need for change management and audit by recording every step in their SDLC, from commit to production, across all of their CI/CD tools. But robust SDLC governance doesn’t just depend on gathering all the necessary data - it also depends on controlling who can add to that data. And that’s exactly what our new access control feature solves.