Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Have You Forgotten About Application-Level Security?

Security is one of the most changeable landscapes in technology at the moment. With innovations, come new threats, and it seems like every week brings news of a major organization succumbing to a cyber attack. We’re seeing innovations like AI-driven threat detection and zero-trust networking continuing to be a huge area of investment. However, security should never be treated as a single plane.

Benefits of Cyber Security: Importance for Businesses and Individuals

Cyber security is a crucial element of the digital age. You may not notice it, but cyber attacks are happening every day to companies and individuals alike. We’ve got you covered with this detailed guide on the importance and benefits of cyber security along with the mitigation strategies and tips for protection against cyber attacks.

How to keep your business secure during the Great Resignation

Millions of workers are leaving their jobs after enduring stay-at-home lockdowns and reflecting on what they need to be truly happy and healthy. While the ‘Great Resignation’ could have a positive impact on society, it also represents a security risk for businesses of all sizes.

Latest FBI Warning: Don't Trust Thumb Drives

The FBI recently warned and advised on a current scam in which bad actors mail malicious thumb drives in packages and trick recipients into thinking there is a legitimate reason for connecting the thumb drive to their computer. Let’s be clear. DON’T. Don’t stick that thing in your computer. You don’t know where it’s been!

California Consumer Privacy Act (CCPA) Compliance: What you need to know to be compliant

The California consumer privacy act (CCPA) is a law that was passed in 2018, and it is in effect from January 1st 2020. The California attorney general’s office has not taken any enforcement action against firms that did not meet the standards until July 1st 2020. A lot of people are unsure about what this new law means for them. Like the GDPR, there are significant penalties for non-CCPA compliance and potential loss of consumer loyalty.

The Supply Chain Needs Better Cybersecurity and Risk Management

The supply chain is under a historic amount of pressure, but the strain on its cybersecurity and risk management may be in even worse condition. As 2021 draws to a close, the global supply chain is in a state comparable to rush-hour traffic in bad weather. Everything seems to be backed up whether due to supply and demand issues, wait times at shipping ports, or any number of other delays.

Running Kubernetes on AWS Fargate

For the last decade, AWS has dominated the cloud computing space with a plethora of cloud services. One of AWS’ great innovations was AWS Fargate, their first containers as a service (CaaS) offering. Prior to the introduction of Fargate, those building in the cloud were forced to choose between IaaS paradigm-focused containers or FaaS-focused serverless functions.

Cybersecurity Statistics of 2021 & Predictions for 2022

Now is a great time to look back on cybersecurity statistics for 2021. They can help IT professionals understand which issues from last year may carry over into 2022. However, it’s also useful to gain expert insights on likely cybersecurity scenarios impacting this year. Knowing about threats makes it easier to combat them. Here are 10 cybersecurity statistics from 2021 and five predictions for 2022.

The THIP Model: Embedding Emotional Intelligence in Third-Party Risk Management

Third-party risk management (TPRM) has grown in prominence as organizations increase their reliance on external parties, from cloud providers to credit card processors. As more enterprises invest in this critical business function, certain best practices are becoming key to a successful TPRM program.

Don't Forget The Digital Supply Chain During M&A...Because It Won't Forget You

Anyone who’s ever been in a relationship knows that the beginnings and ends are the toughest parts. This is when the baggage is dusted off, brought to light and (all too frequently) used detrimentally. Mergers and acquisitions — and their mirror image, divestments — are the organizational equivalents of marriage and divorce. During the process, past indiscretions are discovered, leveraged in negotiations and ideally rectified or laid to rest.