The cybersecurity landscape is in constant flux, and as CISOs, our role is pivotal in navigating its complexities. For 2025, our focus must extend beyond traditional security measures to encompass strategic vision, robust education, and fostering unbreakable resilience. This roadmap outlines key areas for CISOs and their teams to champion, ensuring our organisations are not just protected, but truly prepared for the evolving threat landscape.
A newly discovered vulnerability, CVE-2025-1974, has been identified in the Kubernetes Ingress NGINX Controller, posing a severe security risk to clusters worldwide. With a critical CVSS rating of 9.8, this flaw allows attackers to exploit Kubernetes environments without authentication, potentially leading to complete cluster compromise. Organisations using Ingress NGINX must act immediately to mitigate the risk and secure their infrastructure.
This blog post will break down the severity of CVE-2025-1974, explain its impact, and provide clear steps for upgrading and mitigating potential attacks.
In today’s data-driven world, leveraging the full potential of your cloud data is essential. This blog delves into the strategic advantage of streaming Google Cloud audit logs into BigQuery and visualising them through Looker Studio. Discover how this powerful combination can unlock deeper insights, fortify security monitoring, and transform raw log data into actionable intelligence that drives smarter, more informed decision-making.
Cutting corners by making developers handle non-specialist tasks might seem like a money-saver, but it often backfires. Every distraction, whether unnecessary meetings or out-of-scope work, slows progress. Context-switching is an invisible drain on productivity, and if ignored, it can derail entire projects.
The fix? Platform engineering and internal developer platforms (IDPs). By centralising and automating development workflows, IDPs remove distractions, keep developers focused on their core work, and ultimately save time and money.
This blog unpacks why context-switching is so damaging, its impact on performance, and how an IDP can be the key to eliminating it. If you want a more productive development team and real cost savings, read on…
In the constantly evolving world of cyber threats, a variety of roles within cyber security are essential for protecting an organisation’s assets and sensitive data. These roles range from data administration to more advanced offensive and defensive strategies, with each contributing a unique function to safeguard businesses from cyber-attacks.
This episode's musings are about security-in-depth with a daft analogy of Google Cloud's VPC Service Controls. Making use of multiple technologies to secure your IT.
This episode's thoughts are around project to product transformation - a white paper by Ross Clanton and Amy Walters:
This episode's thoughts on Google Kubernetes Engine and Scrum for DevOps Teams:
This month's thoughts are around:
This month's thoughts are a series of articles in a tale of technical debt:
In the dynamic world of digital innovation, securing a scalable app deployment remains a formidable challenge. Our recent work for a crypto trading startup mirrors this pursuit: the quest for a robust, lightweight, and highly secure architecture for a trading app. This challenge reflects the industry's demand for fortified security amidst a landscape rife with potential threats. In this particular project, Mesoform was employed, not only to provide site reliability, cloud and DevOps engineering but a complete technical architecture and technology management over the whole project. Guiding platform engineering, software engineering and DevOps, as well as architecture and UI design, our holistic approach aimed to optimise project performance and functionality in order to deploy a Crypto Trading App for a crypto trading startup.
In this particular project, Mesoform was employed, not only to provide site reliability, cloud and DevOps engineering but a complete technical architecture and technology management over the whole project. Guiding platform engineering, software engineering and DevOps, as well as architecture and UI design, our holistic approach aimed to optimise project performance and functionality in order to deploy a Crypto Trading App for ProTraders.
In this particular project, Mesoform was employed, not only to provide site reliability, cloud and DevOps engineering but a complete technical architecture and technology management over the whole project. Guiding platform engineering, software engineering and DevOps, as well as architecture and UI design, our holistic approach aimed to optimise project performance and functionality in order to deploy a Crypto Trading App for a crypto trading startup.
This blog is on the importance of NGINX and will discuss how Mesoform implemented it despite facing challenges. Making use of multiple technologies to secure your IT.
In the rapidly evolving landscape of modern applications, Application Programming Interfaces (APIs) play a pivotal role in enabling connectivity and functionality. However, as the reliance on APIs grows, so do the security risks associated with them. To address these concerns, the Open Web Application Security Project (OWASP) released the "API Security Top 10" 2023, a comprehensive list of the most critical API security risks. This year they released the 2023 update to those risks, this blog explores the key findings and recommendations.
Explore SRE (Site Reliability Engineering): Your guide to understanding Site Reliability Engineering’s transformative impact on software management.
Wondering how DevOps can transform software development? Discover expert solutions to streamline processes and optimise collaboration.
This blog is on the psychological influence of good DevOps and SRE practices: building stronger teams and enhancing productivity
Containers have been around now for quite a few years. We can trace the concept back to 1979 and the introduction of the chroot system call but it wasn't until BSD Jails, Solaris Zones and LXC in 2000, 2004 and 2008 when the technology started to mature. Zones in particular became incredibly stable very early on. With a very high level of isolation and performance, capable of multi-tenancy systems.
With the rise of VMWare and IaaS providers like AWS, container technologies took a back seat as the masses embraced cloud computing. Containers weren't fully able to satisfy the demands of ephemeral and dynamically scaling systems. However, in more recent years Docker has revitalised the interest back in this technology by introducing the idea of application containers and a powerful set of tools and infrastructure for maintaining container images.
Expanding the benefits beyond performance and resource utilisation gains, Docker improved standardisation, configuration management and portability, meaning containers are fast becoming the next hot technology (if they're not already). However, they do maintain some challenges in the Cloud. Specifically monitoring, orchestration (e.g. automated scheduling and auto-scaling) and service discovery are an additional burden.