The Strategic Shift from Internal Firewalls

The ‘internal firewalls approach’ to network security is being reevaluated After nearly twenty years in the security industry, I am always thrilled when I see a change in its collective mindset—the bulk of security teams now recognize that a secure network requires more physical devices and rerouting everything. The shift ... Read More

How osquery helps secure your cloud with these two critical CIS Benchmark controls

Two of the 6 basic security controls, according to the Center for Internet Security, are focused on the current state of your assets. Assessing the state of your assets has been a priority for years, but the old means aren’t as effective in modern infrastructure as they were on legacy ... Read More

Cloud Workloads: Not the same ol’ endpoints

This may sound like common sense to developers, but securing the assets in your cloud requires you to recognize just how different a cloud workload is from a user asset. While the high level strategy is nothing new, legacy solutions cannot simply be repurposed in your cloud due to some ... Read More

Is your Mac fleet secure? Tackling the myth of inherent mac security

| | mac edr, macos
There’s a dangerous myth among some Mac users that, unlike Windows, the platform is impervious to malware. Since nothing is bulletproof, it would be dangerous to assume Mac fleet security, so let’s recognize why Macs have historically been low risk and why that looks to be changing ... Read More

Infrastructure Management Has Evolved – Has Your Continuous Monitoring?

Despite there being hundreds of software solutions focused on monitoring, today’s operations professionals lack the assessment and detection coverage they need in their CI/CD infrastructure. Software applications have reached an inflection point in the pace at which businesses are evolving their operations, and so a new approach is needed for ... Read More