EH-Net - Container Security Part 2 - Shipping Pic

Container Security Part 2 – Benchmarks to the Rescue

Containers are like BYOD (Bring Your Own Device). They are infiltrating our ranks, and InfoSec professionals’ gut reaction is to hesitate in including them in their environments. But instead of dismissing containers ...
MITRE ATT&CK™ Framework

The MITRE ATT&CK Framework: What You Need to Know

The MITRE ATT&CK Framework has gained a lot of popularity in the security industry over the past year. I have spent a lot of time researching the hundreds of techniques, writing content ...
Blocks for Flash and others coming to Office 365

Blocks for Flash and others coming to Office 365

If you make use of Flash or Silverlight in your day-to-day activities, you may need to have a word with IT. For everyone else, your Office 365 experience is about to become ...

Understanding the Primary Threats and Security Concerns to Container Environments

Regular readers of The State of Security should now have a general understanding of why organizations need security for their containers. But they still might be a bit fuzzy on the specifics ...

Security Mindset: Balancing Firmness and Flexibility

Navigating the noise, complexity and uncertainties of the cybersecurity landscape demands clear thinking. But that’s no easy task. The security professional today has to be knowledgeable about the organization’s own environment, business ...

Do Your On-Prem Controls Extend into the Cloud?

There’s a Russian proverb “overyai, no proveryai.” (Trust, but verify.) You trust your IT department to keep your systems up and running and configured in a secure manner. But, do you verify ...