Why a “Whole Brain” Approach to Secure DevOps Is Critical

| | DEVOPS, SecDevOps, secure devops, security
Why a “Whole Brain” Approach to Secure DevOps Is Critical Organizations are under constant pressure to remain competitive and increase efficiency. For application developers in DevOps teams, this means functioning like a factory — leveraging the agile and iterative nature of the DevOps methodology for quick application development. Typically, DevOps ... Read More
Five Tips to Secure DevOps

Five Tips to Secure DevOps

| | DEVOPS, SecDevOps, secure devops, security
Five Tips for DevOps Application Security In a recent blog, we took a closer look at DevOps and how this agile process has led to modern software “factories” to develop customer applications in a fast-paced, iterative environment. All of this is great, yet we also discussed how current DevOps processes ... Read More
™

The Top Three Cyber Attack Threats that Cause a Financial CISO to Lose Sleep

We recently had the chance to hear a presentation by the chief information security officer of a leading financial services firm, which gave a number of valuable insights into today’s top security challenges. To set the stage, the speaker shared recent cyber attacks that may not have caught an individual’s ... Read More
Evolve or Die: Integrate Security into Application Development Processes

Evolve or Die: Integrate Security into Application Development Processes

| | security
The first use of a factory was when Ford cranked one up to efficiently roll Model T cars into the market. It became the model of modern industry. Now the same type of mindset is taking hold in application development. The first step was the adoption of the DevOps methodology ... Read More
Security Challenges Related to Containers

Security Challenges Related to Containers

| | aria sds, containers, DEVOPS, SecDevOps, security
The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of slowing down, but it raises many new security challenges. This article takes a closer look at these container security issues, why they exist, and the tactics needed to overcome them ... Read More
The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

| | security, VMware, VMworld
VMworld 2018 started off with a lot of fanfare. VMware CEO Pat Gelsinger kicked the conference off with some mind-boggling statistics: With more than 7,500 customers, VMware NSX has achieved a substantial market leadership position in the software-defined network category – ten times larger than its closest customer. Additionally, VMware’s ... Read More

What is California AB 375, and What Does it Mean for You?

What is the California Data Breach Notification Law (AB 375)? The threat of data breaches in the United States continues to rise, along with the potential impact on the lives of the average consumer. The state of California has led most states in enacting legislation to protect consumers from identity ... Read More
™

What is Foreshadow, and How Can You Overcome this Vulnerability?

| | aria, Foreshadow, hardware, hsm, kms, security
What is Foreshadow, and How Can You Overcome this Vulnerability? Earlier this month it was revealed that another vulnerability – the fourth – was discovered in Intel’s x86 chip architecture. Researchers in Belgium originally alerted Intel to this flaw, initially dubbed Foreshadow NG. Intel subsequently discovered an additional Foreshadow flaw ... Read More
The Seven Security Sessions Not to Miss at VMworld 2018

The Seven Security Sessions Not to Miss at VMworld 2018

| | aria sds, DEVOPS, nsx, nvoy, security, VMworld
Are you attending VMWorld 2018? If you’re attending VMWorld 2018, and trying to weed through the 600+ sessions to decide what to attend it can be daunting. You only have a limited about of time to get the information you need. To help, we’ve compiled the top seven presentations for ... Read More
contact us to learn about cyber insurance coverage

Everything You Need to Know About Cyber Insurance Policy Coverage

As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other business services, the need for cyber insurance is becoming more important. However, paying attention to the details is crucial to understanding what kind of insurance an organization requires and under what circumstances ... Read More
Loading...