Archive for April 22, 2026

OVHcloud and Alchemy enter strategic relationship 

Posted in Commentary with tags on April 22, 2026 by itnerd

 OVHcloudand Alchemy today announced a strategic relationship. Together, the two companies will enable decentralized app and chain developers to benefit from Alchemy’s powerful suite of tools and Supernodes, Alchemy’s blockchain engine, on the secure, de-centralized and high-performance foundation of OVHcloud’s cloud infrastructure.

The strategic relationship has already started to have an impact. The performance-price ratio offered by OVHcloud has enabled Alchemy to scale to new regions ahead of schedule, even in highly regulated markets, helping developers around the world to launch decentralized apps and chains faster. The OVHcloud platform seamlessly interconnects with Alchemy’s existing cloud infrastructure, including hyperscale offerings, giving Alchemy a truly multi-cloud environment. 

Earlier this year, Alchemy supported OVHcloud’s blockchain startup accelerator, helping to build an ecosystem where startups, enterprises, and partners co-innovated and worked to deliver the next generation of blockchain services at global scale.

Inside RAMP: What a leaked database reveals about Russia’s ransomware marketplace

Posted in Commentary with tags on April 22, 2026 by itnerd

Comparitech researchers have publised an in-depth analysis of RAMP (Russian Anonymous Marketplace), a Russian-language cybercrime forum that operated from late 2021 until being seized by the FBI in January 2026. 

Comparitech researchers gained exclusive access to a leaked database from RAMP, the dump containing user records, forum threats, private messages, IP logs, and admin activity from November 2021 through January 2024. 

In the analysis of this dump, the researchers have broken down details regarding the access market, the biggest listings, the affiliate splits, the criminal job market, the top vendors, the top buyers, and more. 

You can read the analysis here: https://www.comparitech.com/news/inside-ramp-what-a-leaked-database-reveals-about-russias-ransomware-marketplace/

National IT Service Providers Day Is Today

Posted in Commentary on April 22, 2026 by itnerd

With National IT Service Providers Day being today, I wanted to share a perspective that goes beyond the standard “keep systems running” narrative.

Jason Tierney, SVP of Managed Services at C3 Integrated Solutions had this to say:

“For defense contractors, the challenge today goes beyond traditional IT support. In real-world assessment scenarios, challenges can come up when internal IT must work with external compliance teams, including process assumptions, incorrect documentation and a lack of coordination during a formal third-party assessment. Many organizations are also navigating multiple compliance frameworks, each with its own language, requirements and techniques. Even seemingly minor admin or system changes right before an assessment can create real problems. 


In regulated environments, IT service providers are taking on a different role, with responsibility that extends beyond downtime and outages the risk of not passing an assessment or annual re-attestation. Strong change management, close coordination and consistent compliance process documentation are critical to getting organizations to an assessment-ready state and helping them stay there.”
 

Jeff Cratty,VP of Cloud & Integration at Blue Mantis adds this:

“National IT Service Provider Day is a reminder that the right technology partner does more than keep systems running. The best providers help organizations assess where they are, strengthen security, modernize what matters most and manage change in ways that support business goals. They create a secure foundation for innovation and help teams move forward with greater clarity and confidence.

As companies navigate AI adoption, cloud transformation and rising operational demands, they need service providers that can connect strategy to execution, protect critical data and reduce risk and stay engaged beyond deployment. That means identifying practical use cases, strengthening data governance and supporting internal teams through change.

When providers deliver that kind of guidance and accountability, they do more than solve technical challenges. They help businesses adapt faster and turn technology investments into measurable value.”

This link provides some suggestions on how you can say thanks to the people who keep your organization running. Trust me when I say that a thank you can go a long way for these people.

SafeBreach launches AI-driven CTEM to close the execution gap 

Posted in Commentary with tags on April 22, 2026 by itnerd

SafeBreach today announced the launch of its AI-powered Continuous Threat Exposure Management (CTEM) solution. This solution is designed to help organizations move beyond siloed security activities toward a complete, closed-loop CTEM program that continuously identifies, prioritizes, and remediates cyber risk at scale.

As enterprises struggle with challenges like AI-generated threats, tool fatigue, and alert overload, traditional reactive security measures are no longer sufficient. Organizations are increasingly turning to the five-phased CTEM framework developed by Gartner™ as a more proactive way to manage exposures, but this has historically required the manual integration of disparate tools, datasets and processes.

SafeBreach is changing that with a unified solution that operationalizes the full CTEM lifecycle. The solution is grounded in the SafeBreach Exposure Validation Platform, which provides the safe, scalable adversarial exposure validation (AEV) capabilities that underpin the entire CTEM framework. Building on this foundation, the SafeBreach Helm AI Agent unifies the platform’s AEV capabilities with data and insights from a customer’s existing security ecosystem to provide a complete 360-degree CTEM solution that ensures exposures are not only identified but continuously validated and resolved.

SafeBreach Helm accomplishes this with a specialized set of capabilities aligned to each CTEM stage. Users query Helm with simple, conversational prompts to initiate each CTEM phase:

  1. The Scoping Phase: SafeBreach Helm leverages contextual data from Threat Intelligence (TI) tools to identify critical assets, business priorities, and relevant segments of the attack surface.
  2. The Discovery Phase: SafeBreach Helm continuously aggregates and correlates exposure data across internal and external environments, using Vulnerability Management (VM) and External Attack Surface Management (EASM) tools.
  3. The Prioritization Phase: SafeBreach Helm uses asset context from the Discovery phase to precisely highlight the exposures that present the greatest risk, helping users cut through the noise. 
  4. The Validation Phase: SafeBreach Helm utilizes the breach and attack simulation (BAS) of SafeBreach Validate and the attack path validation of SafeBreach Propagate to confirm the exploitability of the highlighted exposures and map realistic attack paths using real-world adversary techniques.
  5. The Mobilization Phase: SafeBreach Helm uses SafeBreach’s AI Remediation technology to translate validated findings into actionable guidance that can be shared with Security Information and Event Management (SIEM); Security Orchestration, Automation, and Response (SOAR); and other workflow management and ticketing tools—including ServiceNow and Jira— to enable teams to remediate risk efficiently and effectively.

Key Offerings of the CTEM by SafeBreach Solution:

  • SafeBreach Helm: The AI CTEM Agent that unifies data from sources including AEV, TI, VM, EASM, SIEM, SOAR, and other workflow management and ticketing tools into a single, intelligent interface for proactive risk management.
  • AEV: The SafeBreach Exposure Validation Platform, which combines SafeBreach Validate to test control effectiveness and SafeBreach Propagate to reveal how adversaries could traverse environments to reach critical assets.
  • AI Remediation: Provides context-aware, AI-driven guidance and integrates with SIEM, SOAR, and ticketing systems to operationalize remediation workflows and accelerate risk reduction.
  • Breach Studio: Advanced capabilities to design custom attack scenarios, including a VS Code extension for environment-specific testing.
  • Exposure Hub (Upcoming): A centralized hub that correlates data from VM, EASM, and other tools to provide comprehensive visibility into the attack surface.

Built for large, distributed environments, the CTEM by SafeBreach solution empowers organizations to evolve from fragmented, reactive security practices to a unified, AI-driven CTEM program—grounded in proven AEV and elevated by SafeBreach Helm—to deliver continuous, measurable risk reduction aligned to real-world attacker behavior.

To learn more about the CTEM by SafeBreach solution or the SafeBreach Helm Agent: 

Read the recent blog about SafeBreach Helm

Today Is Earth Day

Posted in Commentary on April 22, 2026 by itnerd

Today is Earth Day and Earth Day matters because the systems we’ve built, especially in tech, don’t just run in isolation, they draw power, consume resources, and scale globally, which means every decision we make at the infrastructure level has a real, cumulative impact on the world around us. The companies that take that seriously and design for efficiency, smarter data placement, and sustainable operations aren’t just being good citizens, they’re building more resilient, cost-effective, and future-proof IT environments that actually perform better under pressure.

Richard Copeland, CEO, Leaseweb USA and Marie-Pier Angers, Sales Director, Leaseweb Canada had this to say: 


Richard Copeland, CEO, Leaseweb USA:

“From a tech and business perspective, I’d bet most people haven’t thought about Earth Day in terms of server utilization, but that’s exactly where this lives. You walk into most environments and what you find isn’t some cutting-edge, perfectly tuned system. It’s racks of infrastructure running at a fraction of their capacity, powered on, cooled, maintained, and barely doing anything. Then on the other end, you’ve got teams overcompensating in the cloud, spinning things up ‘just in case,’ because nobody wants to be the one who underbuilt. So you end up paying for excess on both sides. More machines than you need. More energy than you should be using. A lot of complexity layered on top of it.

When organizations step back and actually place workloads where they make sense, in infrastructure that’s designed to run efficiently at scale, things start to normalize. Utilization goes up. The number of systems required goes down. Cooling demand drops. You can see it in the power draw, you can see it in the monthly bill, and you can feel it operationally because everything is just simpler to run. That’s the part that doesn’t get enough attention. Sustainability in IT isn’t some separate initiative. It’s what naturally happens when you stop running inefficient environments and start treating infrastructure like something that should actually be optimized.”

Marie-Pier Angers, Sales Director, Leaseweb Canada: 

“Many IT environments are inefficient by design. Not because people are careless, but because they’re trying to solve for risk. So they overbuild. They duplicate. They leave capacity sitting there unused because it feels safer than coming up short. Then they layer in cloud on top of that, sometimes the right way, sometimes not, and suddenly you’ve got this sprawl of infrastructure that’s expensive to run and even harder to reason about. The environmental impact is just a byproduct of that inefficiency.

When you start running workloads in infrastructure that’s actually built for efficiency, where higher utilization is the goal, where resources are shared intelligently, and where you’re not defaulting to one model for everything, the math changes pretty quickly. Fewer machines doing more work. Less power required to run them. Less cooling to keep them stable. At the same time, better performance and more predictable costs. That’s why this isn’t a tradeoff conversation. The same decisions that make your environment easier to operate and cheaper to run are the ones that reduce your footprint. That’s the alignment most teams don’t realize is sitting right in front of them.”