What is the Latest Consumer Data Protection Act that Everyone is Talking About?

What is the Latest Consumer Data Protection Act that Everyone is Talking About?

A proposed new data privacy law takes a hard line on personal data usage and seeks to create transparency. What is the Consumer Data Protection Act of 2018? In previous CSPi blogs, we have described many specific data privacy regulations as well as the fact that they are quickly increasing ... Read More

Why a “Whole Brain” Approach to Secure DevOps Is Critical

Why a “Whole Brain” Approach to Secure DevOps Is Critical Organizations are under constant pressure to remain competitive and increase efficiency. For application developers in DevOps teams, this means functioning like a factory — leveraging the agile and iterative nature of the DevOps methodology for quick application development. Typically, DevOps ... Read More
Five Tips to Secure DevOps

Five Tips to Secure DevOps

Five Tips for DevOps Application Security In a recent blog, we took a closer look at DevOps and how this agile process has led to modern software “factories” to develop customer applications in a fast-paced, iterative environment. All of this is great, yet we also discussed how current DevOps processes ... Read More
™

The Top Three Cyber Attack Threats that Cause a Financial CISO to Lose Sleep

We recently had the chance to hear a presentation by the chief information security officer of a leading financial services firm, which gave a number of valuable insights into today’s top security challenges. To set the stage, the speaker shared recent cyber attacks that may not have caught an individual’s ... Read More
Evolve or Die: Integrate Security into Application Development Processes

Evolve or Die: Integrate Security into Application Development Processes

The first use of a factory was when Ford cranked one up to efficiently roll Model T cars into the market. It became the model of modern industry. Now the same type of mindset is taking hold in application development. The first step was the adoption of the DevOps methodology ... Read More
Security Challenges Related to Containers

Security Challenges Related to Containers

The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of slowing down, but it raises many new security challenges. This article takes a closer look at these container security issues, why they exist, and the tactics needed to overcome them ... Read More
The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

VMworld 2018 started off with a lot of fanfare. VMware CEO Pat Gelsinger kicked the conference off with some mind-boggling statistics: With more than 7,500 customers, VMware NSX has achieved a substantial market leadership position in the software-defined network category – ten times larger than its closest customer. Additionally, VMware’s ... Read More

What is California AB 375, and What Does it Mean for You?

What is the California Data Breach Notification Law (AB 375)? The threat of data breaches in the United States continues to rise, along with the potential impact on the lives of the average consumer. The state of California has led most states in enacting legislation to protect consumers from identity ... Read More
™

What is Foreshadow, and How Can You Overcome this Vulnerability?

What is Foreshadow, and How Can You Overcome this Vulnerability? Earlier this month it was revealed that another vulnerability – the fourth – was discovered in Intel’s x86 chip architecture. Researchers in Belgium originally alerted Intel to this flaw, initially dubbed Foreshadow NG. Intel subsequently discovered an additional Foreshadow flaw ... Read More
The Seven Security Sessions Not to Miss at VMworld 2018

The Seven Security Sessions Not to Miss at VMworld 2018

Are you attending VMWorld 2018? If you’re attending VMWorld 2018, and trying to weed through the 600+ sessions to decide what to attend it can be daunting. You only have a limited about of time to get the information you need. To help, we’ve compiled the top seven presentations for ... Read More