Every company is looking for ways to speed up development while incorporating the appropriate level of security. Organizations are successfully doing this by taking a DevOps approach, which increases agility in many areas namely security, IT, and development. But this accomplishment doesn’t come without challenges. For some, deciding to take this new approach comes with […]
The market is at a tipping point with almost half of enterprises currently integrating security into DevOps initiatives.
For years IoT security has been a cause for concern, but 2017 may be the year that IoT attacks and lack of standardized security measures become a regular issue.
Google’s browser will explicitly state HTTP-connected sites are not secure in January 2017.
The “Sweet32 Birthday Attack” does not affect SSL Certificates, but system administrators should disable any Triple-DES cipher.
By 2020, there will be a quarter billion connected vehicles on the road.
Domain hijacking can damage an organization’s brand reputation and cost thousands in missed sales.
Audit logs can help enterprises monitor and keep track of potential security breaches or fraudulent attempts.
Spring cleaning is not only limited to the dust in our basements and the lint in our closets, but also the needless items in our digital junk rooms.