ARIA Cybersecurity Solutions.

What is the Latest Consumer Data Protection Act that Everyone is Talking About?

A proposed new data privacy law takes a hard line on personal data usage and seeks to create transparency. What…

2 years ago

Why a “Whole Brain” Approach to Secure DevOps Is Critical

Why a “Whole Brain” Approach to Secure DevOps Is Critical Organizations are under constant pressure to remain competitive and increase…

2 years ago

Five Tips to Secure DevOps

Five Tips for DevOps Application Security In a recent blog, we took a closer look at DevOps and how this…

2 years ago

The Top Three Cyber Attack Threats that Cause a Financial CISO to Lose Sleep

We recently had the chance to hear a presentation by the chief information security officer of a leading financial services…

2 years ago

Evolve or Die: Integrate Security into Application Development Processes

The first use of a factory was when Ford cranked one up to efficiently roll Model T cars into the…

2 years ago

Security Challenges Related to Containers

The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of…

2 years ago

The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

VMworld 2018 started off with a lot of fanfare. VMware CEO Pat Gelsinger kicked the conference off with some mind-boggling…

2 years ago

What is California AB 375, and What Does it Mean for You?

What is the California Data Breach Notification Law (AB 375)? The threat of data breaches in the United States continues…

2 years ago

What is Foreshadow, and How Can You Overcome this Vulnerability?

What is Foreshadow, and How Can You Overcome this Vulnerability? Earlier this month it was revealed that another vulnerability –…

2 years ago

The Seven Security Sessions Not to Miss at VMworld 2018

  Are you attending VMWorld 2018? If you’re attending VMWorld 2018, and trying to weed through the 600+ sessions to…

2 years ago