Feb 18, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Security
In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes into an open source project titled the Cloud Native Computing Foundation. Kubernetes is capable of provisioning and...
Feb 13, 2020 | Attack Surface Analysis, Cloud security, DevOps, Risk Management, Security
Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive information. The first thing anyone should know when creating an account is to never share their password....
Feb 12, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Enterprise DevSecOps
Within computer systems engineering, software development lifecycle (SDLC) has been a solid way to create high quality software that meets user requirements. SDLC phases are designed to be agile, iterative and chronological, clearly defined in plan, design, build,...
Feb 5, 2020 | Attack Surface Analysis, Cloud security, DevOps, Security
In the recent US Securities and Exchange Commission report Cybersecurity and Resiliency Observations, the Office of Compliance Inspections and Examinations outlined the cybersecurity approaches that financial companies implement to improve their security posture. The...
Feb 4, 2020 | CISO, Cloud security, DevOps, IoT Cybersecurity, Security
Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and support around the clock. However, internet-enabled medical devices are also a prime target for hackers who use malware...
Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...