Common AWS Security Threats and How to Mitigate Them
AWS security best practices are crucial in an age when AWS dominates the cloud computing market. Although moving workloads to the cloud ..
DevSecOps and Log Analysis: Improving Application Security
As time goes on, more and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient ..
Privileged access management: the enterprise security Swiss Army Knife
Newsflash: we’re all human. Mistakes will be made. Unfortunately in IT security, when you’re dealing with company, employee and customer ..
Cybersecurity executive order targets two common attack vectors
Last week, the Administration released an Executive Order (EO) on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” ..
Don’t Fall for Basic Cyber Ploys This Season: Cybersecurity Awareness
October is back. Some people are excited for the signs of fall: colorful leaves, orchard visits, oddly spiced coffees. Others are excited ..
Why a Common Security Toolset is Essential for DevSecOps
Doing DevSecOps means ensuring that developers, security admins and IT Ops engineers work together effectively. To a large extent, achieving ..