Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How Modern IT Solutions Secure Business Operations and Drive Scalability

In today's fast-paced digital economy, business growth is heavily dependent on technological capability. However, as organisations expand their digital footprint, they simultaneously widen their attack surface. Scaling operations without a robust security framework often leaves companies vulnerable to severe operational disruptions, regulatory fines, and reputational damage. For business leaders, the challenge lies in deploying infrastructure that supports rapid growth while maintaining airtight security across all digital assets.

CertKit is out of beta

CertKit is officially out of beta. We started building CertKit a year ago, and since then over 600 people signed up, issued certificates, and deployed to their infrastructure. Several are running it as their production certificate management platform right now. We built a lot during the beta. Some of it we planned: SSO, team management, alerting. Other things, users had to beat into us. The Keystore came from enterprise security requirements to keep private keys in house.

Using Open Policy Agent (OPA) with Terraform: Tutorial and Examples [2026]

Infrastructure as Code (IaC) solves the provisioning problem. It doesn't solve the governance problem. You can version your Terraform configuration, run it in a pipeline, review every pull request — and still deploy an S3 bucket with public access, a VM with no encryption, or a resource that exceeds your cost budget. Nothing in the standard IaC workflow checks for those things. The reviewer has to know what to look for. And they won't catch it every time. Policy as Code changes that.

Kosli and Adaptavist Partner to Automate Governance for AI driven Software Delivery

Today, Kosli and Adaptavist announce a strategic partnership to help regulated enterprises automate governance for AI driven software delivery - making it automated, continuous, and evidence-driven rather than a manual checkpoint that sits apart from DevOps and CI/CD. Adaptavist brings deep enterprise DevOps transformation expertise: assessment and strategy, DevSecOps integration, developer experience, and implementation across Atlassian, GitLab, and AWS.

IREX Enhances FireTrack AI Module for Faster, More Accurate Fire Detection

WASHINGTON, DC - IREX, a global developer of ethical AI and intelligent video analytics, has announced a significant upgrade to its FireTrack fire and smoke detection module, expanding its capabilities across a wide range of environments. As outlined in an article on TNW, the updated solution is designed to work seamlessly with existing camera infrastructure, eliminating the need for additional hardware while extending its use to critical infrastructure, public institutions, residential and commercial properties, and natural environments such as parks and forests.

Why Cloud and DevOps Practices Matter to Prop Trading Firms

The financial industry has always been driven by speed, precision, and the ability to act on information faster than anyone else. In recent years, prop trading firms have found themselves at a crossroads where traditional infrastructure simply cannot keep up with the demands of modern markets. Cloud computing and DevOps practices have emerged as two of the most transformative forces reshaping how trading operations are built, managed, and scaled. Understanding why these technologies matter is not just useful for tech teams, it is essential knowledge for anyone involved in or curious about the future of high-performance trading.

Identify Weaknesses like a Ninja

Most IT teams find themselves playing catch up when dealing with vulnerabilities within their IT environments. In this stream, Director of Community, Jonathan Crowe joined by Director of Product Management, Greg Thomas and Sr. Product Marketing Manager, Mark Bermingham, will discuss how to be proactive and build a vulnerability management process that reduces risks and costs. What you’ll learn.

npm axios attack - What happened and how to protect your supply chain

100M+ weekly downloads. One compromised maintainer account. A remote access trojan in two active release branches. This is a 30-minute breakdown of the Axios npm supply chain attack – how it happened, why it was hard to detect, and what any engineering team can do right now to reduce exposure. Nigel Douglas, Head of Developer Relations at Cloudsmith, is joined by Jenn Gile, co-founder of Open Source Malware, a community-driven threat intelligence platform focused on malicious open source packages.

Introducing Zero Trust Architecture for Software Delivery | Harness Blog

For the world’s largest financial institutions, places like Citi and National Australia Bank, shipping code fast is just part of the job. But at that scale, speed is nothing without a rock-solid security foundation. It’s the non-negotiable starting point for every release. Most Harness users believe they are fully covered by our fine-grained Role-Based Access Control (RBAC) and Open Policy Agent (OPA).