governance

Privacy Challenges Illustrated by Recent Cases
In the 1973 baseball melodrama Bang the Drum Slowly, the players, intent on scamming some rubes, play a card game called “TEGWAR.” It stands, as you later learn, for ‘The Exciting Game ...

Organizations Struggle With CCPA, CPRA, GDPR Compliance
The vast majority—92% of companies across all verticals, states and business sizes—are still unprepared for compliance with the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA), while a similar ...

5 Ways Cloud Native Guardrails Help Your Development Team Deliver
Traditional approaches to governance, such as Information Technology Infrastructure Library (ITIL) approaches that created a set of detailed practices for IT service and asset management, were overly restrictive and ultimately slowed development ...

GitOps Best Practices and the Kubernetes Guardrails You Need to Follow Them
GitOps is a buzzword everyone is talking about, a term coined in 2017 by Weaveworks. It uses an operations by pull request approach to define and manage networking, infrastructure, application code, and ...

Cybersecurity in 2022: It’s Not Getting Easier
As we wrap up the year, it always makes sense to take a look back and see what worked and what didn’t; what we can do better and what we have to ...

What is Kubernetes Governance?
Kubernetes governance is the set of policies and procedures organizations adopt to define how Kubernetes is managed and maintained, and it is an essential part of how enterprises become production-ready at scale ...

Low-Code/No-Code Security Governance
From the Great Resignation to recent tech layoffs driven by the recent economic downturn, we’ve rarely seen this much upheaval as organizations struggle to meet their staffing needs and maintain operations. New ...
Quantifying the Social Impact of Ransomware and ESG Disclosure Implication
2022 began with successful ransomware attacks against global IT and digital transformation providers, no thanks to the notorious LAPSUS$ ransomware gang. Often, any discussion about ransomware impact has mostly centered on affected ...

Security Vs. Compliance: Understanding the Difference
Security and compliance. With data privacy in the headlines and cyberattacks on the rise, these two simple words have become hot topics across just about every industry. But as conversations about security ...
NIST CSF 2.0 Workshop Themes: Praetorian’s View
On 17 August 2022, NIST conducted the first Workshop to organize the effort to update the NIST Cybersecurity Framework (CSF) to version 2.0. Praetorian originally submitted comments to the CSF 2.0 RFI ...