Are You Configured for Failure?

Are You Configured for Failure?

| | Informative
Every year, an exorbitant amount of money is spent on ensuring companies’ digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often misconfigured the cloud, making the system an easy target. Second, aggressive types of ransomware attacks are on the rise. Third, ... Read More
Are You Configured for Failure?

Are You Configured for Failure?

| | Informative
Every year, an exorbitant amount of money is spent on ensuring companies’ digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often misconfigured the cloud, making the system an easy target. Second, aggressive types of ransomware attacks are on the rise. Third, ... Read More
Spooky Action from a Distance

Spooky Action from a Distance

| | Informative
The first question that popped into my mind when I became aware of the global IT chaos that started this Friday and the corresponding causes that were articulated was, “How do two independent objects cause each other to react so violently that the net effect generated from such interaction causes ... Read More
Spooky Action from a Distance

Spooky Action from a Distance

| | Informative
The first question that popped into my mind when I became aware of the global IT chaos that started this Friday and the corresponding causes that were articulated was, “How do two independent objects cause each other to react so violently that the net effect generated from such interaction causes ... Read More
Pledge vs Reality – Secure by Design

Pledge vs Reality – Secure by Design

| | Informative
A few weeks ago, I stumbled upon the website of a company that has recently nominated itself to be part of the “Secure of Design,” an endeavor championed by the Federal government and reinforced via several executive orders and corresponding guidelines disseminated by the Cybersecurity and Infrastructure Security Agency (CISA) ... Read More
Pledge vs Reality – Secure by Design

Pledge vs Reality – Secure by Design

| | Informative
A few weeks ago, I stumbled upon the website of a company that has recently nominated itself to be part of the “Secure of Design,” an endeavor championed by the Federal government and reinforced via several executive orders and corresponding guidelines disseminated by the Cybersecurity and Infrastructure Security Agency (CISA) ... Read More
Make WAAP Interesting Again by Quantifying Operational Efficiency and Secure by Design.

Make WAAP Interesting Again by Quantifying Operational Efficiency and Secure by Design.

| | Informative
The adoption of the cloud is the biggest driver of the DevOps development process. Before cloud, waterfall (80’s to late 90’s) and agile (2000 to late 2000’s) were the most prominent development processes. Each re-enforces their own specific application architecture, namely N-Tier and Monolithic. Each required very specific kinds of ... Read More
Make WAAP Interesting Again by Quantifying Operational Efficiency and Secure by Design.

Make WAAP Interesting Again by Quantifying Operational Efficiency and Secure by Design.

| | Informative
The adoption of the cloud is the biggest driver of the DevOps development process. Before cloud, waterfall (80’s to late 90’s) and agile (2000 to late 2000’s) were the most prominent development processes. Each re-enforces their own specific application architecture, namely N-Tier and Monolithic. Each required very specific kinds of ... Read More
Efficiency is All You Need

Efficiency is All You Need

| | Informative
A chance encounter with Texas’s beloved company’s Chief Human resources officers tempted me to ask a candid question. The question was a question that lots of sales engineers will be asking when they attempt to sell a technology product to an organization. The question from a Sales Engineer typically is: ... Read More
Efficiency is All You Need

Efficiency is All You Need

| | Informative
A chance encounter with Texas’s beloved company’s Chief Human resources officers tempted me to ask a candid question. The question was a question that lots of sales engineers will be asking when they attempt to sell a technology product to an organization.   The question from a Sales Engineer typically ... Read More