Matthew Pascucci

Podcast: CISO Speak – Vulnerability Management in the Cloud

The post Podcast: CISO Speak – Vulnerability Management in the Cloud appeared first on CCSI ...

Quantum Computing to Protect Data: Will You Wait and See or Be an Early Adopter?

Time to dispel with a myth: quantum computing is still just a theory. It’s not. If you don’t believe us, read here. And because it’s past the theoretical stage, commercialization is not ...

Imperva and Amazon Partner to Help Mitigate Risks Associated With Cloud Migration

Helping our customers reduce the risks associated with migrating to the cloud, and preventing availability and security incidents, has been a major development focus for Imperva over the last several years. Why ...
pki-high-assurance-cloud

How to Maintain PKI High Assurance in the Cloud, for the First Time

Cybersecurity adoption is booming, with record IT spending on security solutions for enterprises using on-premises as well as cloud and web-based services. Along with the proliferation of vendors and solutions is also ...
Docker Part 1: Getting Started in Docker for the sysadmin who doesnt know what the hell that is

Using Docker To Install OpenVAS On CentOS

An interesting post from Gerry Williams at gerrywilliams.net Description: Saw a post on r/sysadmin the other day with a walkthrough on using Docker for the first time. Thought I would take some ...
cloud

Achieve CIS Compliance in Cloud, Container and DevOps Environments

| | CIS, Cloud, Complaince, containers, DEVOPS, policy
If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies up to date with these new technologies. New security techniques are required ...
Protecting Applications in a Serverless Architecture

Protecting Applications in a Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and deployed ...
George Chanady

Best Practices for Containers

As more enterprise IT operations organizations move to container technology, IT administrators are having to morph into DevOps roles to deal with the container orchestration systems within IT production. These include systems ...

How Vulnerable Is the Presidential Alert System?

Thanks to a new notification service launched by the United States government in 2018, the President now has the power to issue alerts to every citizen with a working cell phone. The ...
Check Point Acquires Dome9 to Advance Cloud Security

Check Point Acquires Dome9 to Advance Cloud Security

Check Point Technologies this week moved to extend the reach of its Infinity Architecture for implementing and maintaining cloud security policies by acquiring Dome9. Peter Alexander, chief marketing officer for Check Point, ...
Security Boulevard
Loading...