Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Adventures of Cyber Security Monitoring During 2018 U.S. Midterm Elections

With all the Russian election hacking scandals in the news during and after the 2016 Presidential election, curiosity consumed me to architect and run an experiment to see if I could monitor changes in the threat landscape in either Moscow, Russia or Washington D.C. during the 2018 U.S. midterm elections.

To Agent or Not to Agent: That Is the Vulnerability Management Question

With the evolution of technology comes new approaches to solving problems. Sometimes a new approach fixes the problem; sometimes it creates new ones. The good thing is as folks who work in fast-paced, high-tech environment, we information security professionals are great at quickly analyzing the new technologies and applying them to our daily lives. …Or so we thought!

Sysdig and IBM to collaborate on IBM Cloud Private & IBM Multicloud Manager container monitoring and security

Today at Think 2019 we’re announcing our intent to work with IBM to support the Sysdig Cloud-Native Intelligence Platform on IBM Cloud Private and IBM Multicloud Manager. By supporting IBM Multicloud Manager and IBM Cloud Private, Sysdig will help IBM customers accelerate the transition to cloud architectures.

Supply Chain Security - Sex Appeal, Pain Avoidance and Allies

So how do you marshal the resources that you need to implement effective supply chain security? Borrowing from the same motivation techniques that we use to keep ourselves going to the gym, I recommend a combination of sex appeal (highlighting attractive benefits), pain avoidance (highlighting the painful risks) and recruiting allies (finding support within and outside of your organization).

Supporting a geographically dispersed workforce with Terminal Servers

Many organizations expand their operations by adding offices in remote locations. This strategy helps growing teams tap into new markets, operate in local time zones, and accommodate local nuances to provide better, localized service. However, geographic growth can cause logistical complexity, so it’s important to ensure teams stay connected wherever work happens.

Delve into the Jotform + Egnyte integration

Creating online forms, sending them out, and storing incoming response data is now easier than ever. Egnyte integrates with JotForm, a popular online form building software, to transfer submitted form responses to your Egnyte folder seamlessly. You can, for instance, open your Egnyte folder to access documents, such as applications or photos, that customers attached to a submitted JotForm form.

We are compliant why do we need a security program?

Often in the realm of IT management, the thought of IT compliance is associated with information security. This is unfortunately not the case as they are two very different things. In this article, we will simplify compliance, and discuss why a pro-active security program is the ideal approach for modern business practice.