privacy data game baseball

Privacy Challenges Illustrated by Recent Cases

In the 1973 baseball melodrama Bang the Drum Slowly, the players, intent on scamming some rubes, play a card game called “TEGWAR.” It stands, as you later learn, for ‘The Exciting Game ...
Security Boulevard
compliance data privacy shield security remote work

Organizations Struggle With CCPA, CPRA, GDPR Compliance

The vast majority—92% of companies across all verticals, states and business sizes—are still unprepared for compliance with the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA), while a similar ...
Security Boulevard
5 Ways Cloud Native Guardrails Help Your Development Team Deliver

5 Ways Cloud Native Guardrails Help Your Development Team Deliver

| | governance
Traditional approaches to governance, such as Information Technology Infrastructure Library (ITIL) approaches that created a set of detailed practices for IT service and asset management, were overly restrictive and ultimately slowed development ...
GitOps Best Practices and the Kubernetes Guardrails You Need to Follow Them

GitOps Best Practices and the Kubernetes Guardrails You Need to Follow Them

| | governance
GitOps is a buzzword everyone is talking about, a term coined in 2017 by Weaveworks. It uses an operations by pull request approach to define and manage networking, infrastructure, application code, and ...
Horizon3.ai insider threat cybersecurity alert fatigue

Cybersecurity in 2022: It’s Not Getting Easier

As we wrap up the year, it always makes sense to take a look back and see what worked and what didn’t; what we can do better and what we have to ...
Security Boulevard
What is Kubernetes Governance?

What is Kubernetes Governance?

| | governance
Kubernetes governance is the set of policies and procedures organizations adopt to define how Kubernetes is managed and maintained, and it is an essential part of how enterprises become production-ready at scale ...
Grammatech LCNC security Arctic Wolf Log4j BlastWave ransomware blast radius cyberattack

Low-Code/No-Code Security Governance

From the Great Resignation to recent tech layoffs driven by the recent economic downturn, we’ve rarely seen this much upheaval as organizations struggle to meet their staffing needs and maintain operations. New ...
Security Boulevard

Quantifying the Social Impact of Ransomware and ESG Disclosure Implication

2022 began with successful ransomware attacks against global IT and digital transformation providers, no thanks to the notorious LAPSUS$ ransomware gang. Often, any discussion about ransomware impact has mostly centered on affected ...
compliance security Puppet compliance data lifecycle

Security Vs. Compliance: Understanding the Difference

Security and compliance. With data privacy in the headlines and cyberattacks on the rise, these two simple words have become hot topics across just about every industry. But as conversations about security ...
Security Boulevard

NIST CSF 2.0 Workshop Themes: Praetorian’s View

On 17 August 2022, NIST conducted the first Workshop to organize the effort to update the NIST Cybersecurity Framework (CSF) to version 2.0. Praetorian originally submitted comments to the CSF 2.0 RFI ...