Infrastructure
More on the Security of the 2020 US Election
Last week I signed on to two joint letters about the security of the 2020 election. The first was as one of 59 election security experts, basically saying that while the election ...
Proxies, Pivots, and Tunnels – Oh My!
Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things. However, to me, these terms could mean the same thing too. A ...
3 Areas of Your IT Infrastructure that SCM Can Help to Secure
Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it ...
Using Disinformation to Cause a Blackout
Interesting paper: "How weaponizing disinformation can bring down a city's power grid": Abstract: Social media has made it possible to manipulate the masses via disinformation and fake news at an unprecedented scale ...
6 Steps to Effectively Manage Business Data
The post 6 Steps to Effectively Manage Business Data appeared first on CCSI ...
4 Best Practices for Securing Your Open Source Components
The post 4 Best Practices for Securing Your Open Source Components appeared first on CCSI ...
Security in Kubernetes Environment
The post Security in Kubernetes Environment appeared first on CCSI ...
Integrating Infrastructure as Code into a Continuous Delivery Pipeline
We’re here to talk about integrating infrastructure as code into a continuous delivery pipeline. We’ll start by defining infrastructure as code then explain some of the problems it solves. Defining Infrastructure as ...
Understanding Vulnerability Scoring: CVSS Explained
The post Understanding Vulnerability Scoring: CVSS Explained appeared first on CCSI ...
Business Managed IT Maintenance or Break/Fix
The post Business Managed IT Maintenance or Break/Fix appeared first on CCSI ...

