Syndicated Blog

Blog – CSPi
Delivering a Portfolio of Hardware and Consulting Solutions Designed to Meet Complex and Demanding Technical Challenges.

Five Best Practices to Achieving a Secure DevOps Model

The first article in our two-part series introduced the concept of a “whole brain” approach to achieving secure DevOps. This article continues the discussion by taking a closer look at the five ...
™

2018 in Review: The Top Four Takeaways in Security

Our last blog of 2018 takes a closer look at four critical security developments and trends … and how we can apply to improve security and compliance in 2019. Whether you’re looking ...
What is the Latest Consumer Data Protection Act that Everyone is Talking About?

What is the Latest Consumer Data Protection Act that Everyone is Talking About?

A proposed new data privacy law takes a hard line on personal data usage and seeks to create transparency. What is the Consumer Data Protection Act of 2018? In previous CSPi blogs, ...

Why a “Whole Brain” Approach to Secure DevOps Is Critical

| | DEVOPS, SecDevOps, secure devops, security
Why a “Whole Brain” Approach to Secure DevOps Is Critical Organizations are under constant pressure to remain competitive and increase efficiency. For application developers in DevOps teams, this means functioning like a ...
Five Tips to Secure DevOps

Five Tips to Secure DevOps

| | DEVOPS, SecDevOps, secure devops, security
Five Tips for DevOps Application Security In a recent blog, we took a closer look at DevOps and how this agile process has led to modern software “factories” to develop customer applications ...
™

The Top Three Cyber Attack Threats that Cause a Financial CISO to Lose Sleep

We recently had the chance to hear a presentation by the chief information security officer of a leading financial services firm, which gave a number of valuable insights into today’s top security ...
Evolve or Die: Integrate Security into Application Development Processes

Evolve or Die: Integrate Security into Application Development Processes

| | security
The first use of a factory was when Ford cranked one up to efficiently roll Model T cars into the market. It became the model of modern industry. Now the same type ...
Security Challenges Related to Containers

Security Challenges Related to Containers

| | aria sds, containers, DEVOPS, SecDevOps, security
The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of slowing down, but it raises many new security challenges. This article takes ...
The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

| | security, VMware, VMworld
VMworld 2018 started off with a lot of fanfare. VMware CEO Pat Gelsinger kicked the conference off with some mind-boggling statistics: With more than 7,500 customers, VMware NSX has achieved a substantial ...

What is California AB 375, and What Does it Mean for You?

What is the California Data Breach Notification Law (AB 375)? The threat of data breaches in the United States continues to rise, along with the potential impact on the lives of the ...
Loading...