Last week I signed on to two joint letters about the security of the 2020 election. The first was as…
Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things. …
Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network.…
Interesting paper: "How weaponizing disinformation can bring down a city's power grid": Abstract: Social media has made it possible to…
The post 6 Steps to Effectively Manage Business Data appeared first on CCSI.
The post 4 Best Practices for Securing Your Open Source Components appeared first on CCSI.
The post Security in Kubernetes Environment appeared first on CCSI.
We’re here to talk about integrating infrastructure as code into a continuous delivery pipeline. We’ll start by defining infrastructure as…
The post Understanding Vulnerability Scoring: CVSS Explained appeared first on CCSI.
The post Business Managed IT Maintenance or Break/Fix appeared first on CCSI.