Operations | Monitoring | ITSM | DevOps | Cloud

Identity Guardian: Secure Device Access Simplified | Minute-ish Edition | Zebra

Zebra Identity Guardian makes identity management simple and secure, right out of the box. With fast, intuitive setup, organizations can quickly protect devices, apps, and data without adding IT overhead. Built on Zebra DNA’s trusted security foundation, it ensures users are authenticated seamlessly so work stays productive and protected.

Nonsense Networking: Tech Talk #8

Ever feel like getting simple data from your network is way harder than it should be? You're not alone. With so many devices, the amount of data can be overwhelming, making it tough to see what's actually happening. In this stream, we're breaking down the common frustrations with network monitoring. We'll cover: The SNMP Problem: We'll start with why the "standard" method, SNMP, is often a pain. We'll look at the challenge of finding the right MIBs and OIDs just to get tools like Telegraf or Prometheus to work.

Automating GDPR compliance for web applications with CircleCI

Since 2018, the General Data Protection Regulation (GDPR) compliance has been an important milestone in the evolution of privacy laws for web application users across Europe. GDPR requires companies to obtain explicit user consent for data collection and processing, and only for specified, legitimate purposes. It’s a law based on principles of transparency and purpose limitation. This law applies to global companies dealing with EU citizen data, giving individuals control over personal data.

Using PostgreSQL Anonymizer to Generate Synthetic Data

Set aside the data masking features of PostgreSQL Anonymizer. This plugin can save the day during development by simplifying your workflow and generating schema-accurate, privacy-compliant test data. In a previous post, we discussed using static and dynamic masking to anonymize data. I spent the last two weeks trying to write followups for the anonymization posts. It's time to confess... I'm an over-engineerer.

(ServiceNow + Kentik) From Reactive to Proactive: The Rise of Agentic Networks

Agentic AI is not just hype—it’s a force multiplier that enables infrastructure and operations teams to do more, with less effort, in less time. Importantly, it helps IT teams compress time to resolution and even proactively detect and respond to issues, before they escalate.

Critical Microsoft Vulnerability Disclosed: What You Need to Know

A Microsoft vulnerability with a 7.2 CVSS score has been disclosed, requiring specific steps for exploitation. Proof of concept code is available, which gives attackers an advantage. This vulnerability affects only Windows Server 2025, limiting its impact. Users are advised to apply OS updates for Windows Server 2025 this month to mitigate risks.

How to Monitor OTP-Protected Web Applications

If you’ve ever used an online banking application to complete a transaction or gone through a checkout on an e-commerce platform, chances are you’ve utilized or interacted with an OTP-protected application. One-Time Password (OTPs) are at the center of most multi-factor authentication (MFA) systems. OTPs are temporary codes delivered by SMS, email, authenticator apps, push notifications, etc.