More on the Security of the 2020 US Election

Last week I signed on to two joint letters about the security of the 2020 election. The first was as one of 59 election security experts, basically saying that while the election ...
Professionally Evil Fundamentals: Introduction

Proxies, Pivots, and Tunnels – Oh My!

Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things.  However, to me, these terms could mean the same thing too.  A ...

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it ...

Using Disinformation to Cause a Blackout

Interesting paper: "How weaponizing disinformation can bring down a city's power grid": Abstract: Social media has made it possible to manipulate the masses via disinformation and fake news at an unprecedented scale ...
Cost Containment

6 Steps to Effectively Manage Business Data

The post 6 Steps to Effectively Manage Business Data appeared first on CCSI ...
cloud security

4 Best Practices for Securing Your Open Source Components

The post 4 Best Practices for Securing Your Open Source Components appeared first on CCSI ...
Security in Kubernetes Environment

Security in Kubernetes Environment

The post Security in Kubernetes Environment appeared first on CCSI ...

Integrating Infrastructure as Code into a Continuous Delivery Pipeline

We’re here to talk about integrating infrastructure as code into a continuous delivery pipeline. We’ll start by defining infrastructure as code then explain some of the problems it solves. Defining Infrastructure as ...
Understanding Vulnerability Scoring: CVSS Explained

Understanding Vulnerability Scoring: CVSS Explained

The post Understanding Vulnerability Scoring: CVSS Explained appeared first on CCSI ...
Business Managed IT Maintenance or Break/Fix

Business Managed IT Maintenance or Break/Fix

The post Business Managed IT Maintenance or Break/Fix appeared first on CCSI ...