policy
Nexus Repo and Datree Integration Deliver Automated Pipeline Control
If your organization or development team currently uses, is considering, or has plans to use open source software to accelerate development and innovation, then you are likely familiar with the transformational shift ...
Should User Passwords Expire? Microsoft Ends its Policy
If you have ever worked for an organization that uses Microsoft-based systems, there is a high likelihood that your IT or security team has implemented a policy that occasionally forces you to ...
Make No Mistake — Microsoft Is A Security Company Now
That’s not a bad start of the day, reading such a headline from a Forrester analyst. I am often asked, how far we are going to drive security within Microsoft. Well, I ...
An important step toward peace and security in the digital world
I think we are all in agreement that the internet as it is today is a great achievement but there needs to be a certain level of agreement between the different players ...
Achieve CIS Compliance in Cloud, Container and DevOps Environments
If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies up to date with these new technologies. New security techniques are required ...
Do we really need a CSO?
I was just reading an article called Does Facebook even need a CSO? – initially my reaction was (as most of yours I guess): “What a stupid question, for sure we need ...
Podcast: CISO Speak – Policy and Procedure
This months podcast features host Larry Bianculli speaking with guest CISO Jeff Jennings from Healthplex, as well as our very own Matthew Pascucci, cybersecurity practice manager, at CCSI, on policy and procedures ...
Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business.
An anonymous report claims that a ton of your company’s customer data has been exposed. A sense of calm is in the air as you enact your vulnerability disclosure policy. You save ...
Fed Up? Fire Up This Cloud Browser.
The Facebook/Cambridge Analytica fiasco did not happen overnight or by “mistake”. Users pay for “free” services and apps with the loss of privacy and data protection. In contrast, Authentic8’s cloud browser Silo ...
The Six Biggest Inside Threats to Law Firm IT
by Jordan McQuown, CIO, LogicForce Incidental actions of insiders pose a threat to law firm IT that is often underestimated. What are the six biggest internal cybersecurity risks for your law firm, ...
