Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Interview with Cybersecurity Specialist Mark Kerzner

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Mark Kerzner, software developer and thought leader in cybersecurity training who is also the VP at training solutions company, Elephant Scale. His company has taught tens of thousands of students at dozens of leading companies. Elephant Scale started by publishing a book called ‘Hadoop Illuminated‘.

Advancing Cybersecurity with Data Lakes

As companies generate an ever-increasing amount of data, security information and event management (SIEM) becomes increasingly challenging. Cybersecurity professionals have more to manage, and as cybercrime rises, there is less time to do so. While big data poses challenges for security teams, it also presents an opportunity. As of 2019, 52.5% of organizations worldwide have been using big data, with another 38% planning to do so in the future.

Advancing Cybersecurity with Data Lakes

Written by Devin Partida As companies generate an ever-increasing amount of data, security information and event management (SIEM) becomes increasingly challenging. Cybersecurity professionals have more to manage, and as cybercrime rises, there is less time to do so. While big data poses challenges for security teams, it also presents an opportunity. As of 2019, 52.5% of organizations worldwide have been using big data, with another 38% planning to do so in the future.

What is the Difference Between Vulnerability Assessment and Penetration Testing?

A vulnerability assessment is the process of identifying IT security weaknesses in your network, operating systems, firewalls, and hardware, and then taking steps to fix them. Penetration testing, also known as “pen testing,” is an intentional, simulated cyberattack against your IT systems to find vulnerabilities and test the efficacy of cybersecurity controls. Both are essential components of a comprehensive vulnerability management and network security protocol.

The Real Problem with Ransomware

Ransomeware can be a company’s worst nightmare. It’s not simply “getting a virus” or “clicking on a malicious email.” It is a systematic plan created by hackers to take your private information. Once they have a foothold in your private data, they use their position to blackmail you into submitting a payment. Technology to prevent ransomware has gotten better but attackers have gotten smarter and more methodical.

DevOps vs. Agile: What Is the Difference?

DevOps and Agile are popular modern software development methodologies. According to the 14th Annual State of Agile Report, 95% and 76% of the respondents stated that their organizations had adopted Agile and DevOps development methods, respectively. Interestingly, both approaches have the same aim: deliver the end product as efficiently and quickly as possible.

The risks of spreadsheet complacency

Where would we be without our beloved Excel spreadsheets? Since Microsoft first launched its Excel spreadsheet software in 1985, it has grown to arguably become the most important computer program in workplaces globally. The spreadsheet has truly become entrenched in daily business processes as well as critical applications - but the million dollar question is - are spreadsheets secure? Unfortunately when it comes to spreadsheet security, with popularity comes complacency.

Getting to Resilience

When I turned 7, I got my first BMX bike. Of course, within a week my best friend and I built a ramp with plywood and cinderblock. I remember the first jump vividly. I sped down the street like a miniature Evil Knievel and hit the ramp at a pretty good clip. A moment after I caught “big air,” my front tire hit the road, and I went over the handlebars – leaving a fair amount of skin on the road.