8 Essentials for Automated DevSecOps Compliance

In the last decade, there has been an increasing focus on compliance and security. As a result, regulatory bodies have established severe penalties for non-compliance. Consequently, organizations put together compliance frameworks that are pertinent to their industry. To support such frameworks, security tool vendors have developed solutions to help these ... Read More
Rezilion-Azure DevOps Integration

Deliver Secure Products with Rezilion Azure DevOps Integration

With an unprecedented amount of product releases, developers and security teams are both faced with the challenge of balancing security with on-time delivery. Without critically-needed automation tools to detect, prioritize, and address security risks, DevOps teams end up patching vulnerabilities that do not pose actual risks. This slows down development, ... Read More

IT Network Attacks Can Impact Your OT Networks, Too

On May 8th, I was at a gas station filling up my car before a trip I was taking when the news about a cyberattack against a large pipeline company broke. The attack led them to halt all operations. Ultimately, the incident stemmed from a ransomware infection in which a ... Read More

To Patch or Not to Patch in OT – That Is the Real Challenge

The objective of an organization when implementing cybersecurity controls is to eliminate risk, but this oftentimes involves settling for managing risk at an acceptable level. Each organization defines what that acceptable level is depending on several factors including the environment, the criticality of function, the asset type, etc. There are ... Read More

From a Single Pane of Glass, to Functional Dashboards to Manage Cyber Risk

For the longest time, or as far as I can remember, the holy grail of all networking platforms has been the need for a single pane of glass, that single source of all information that you would need to be most effective. So, what is a single pane of glass? ... Read More

Dashboards: An Effective Cybersecurity Tool

Data is only as good as what you are able to do with it.  Not only does the cybersecurity universe collect data, but individual enterprises also collect cybersecurity data from within their organization as well as from external sources in order to add to more context and relevance. All data ... Read More

Why Cybersecurity Pros Need to Be Good Storytellers

Like storytelling, data visualization can be used to provide a narrative about your organization’s cybersecurity posture. Cybersecurity is never a single thing; it is an amalgamation of an often growing list of issues that never seem to end. So in order to make some sense of what it means for ... Read More

Secure Guardrails