Infrastructure

More on the Security of the 2020 US Election

Last week I signed on to two joint letters about the security of the 2020 election. The first was as…

2 weeks ago

Proxies, Pivots, and Tunnels – Oh My!

Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things. …

2 months ago

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network.…

3 months ago

Using Disinformation to Cause a Blackout

Interesting paper: "How weaponizing disinformation can bring down a city's power grid": Abstract: Social media has made it possible to…

4 months ago

6 Steps to Effectively Manage Business Data

The post 6 Steps to Effectively Manage Business Data appeared first on CCSI.

6 months ago

4 Best Practices for Securing Your Open Source Components

The post 4 Best Practices for Securing Your Open Source Components appeared first on CCSI.

6 months ago

Security in Kubernetes Environment

The post Security in Kubernetes Environment appeared first on CCSI.

6 months ago

Integrating Infrastructure as Code into a Continuous Delivery Pipeline

We’re here to talk about integrating infrastructure as code into a continuous delivery pipeline. We’ll start by defining infrastructure as…

7 months ago

Understanding Vulnerability Scoring: CVSS Explained

The post Understanding Vulnerability Scoring: CVSS Explained appeared first on CCSI.

7 months ago

Business Managed IT Maintenance or Break/Fix

The post Business Managed IT Maintenance or Break/Fix appeared first on CCSI.

7 months ago