Blog

Five Tips to Secure DevOps

Five Tips for DevOps Application Security In a recent blog, we took a closer look at DevOps and how this agile process has led to modern software “factories” to develop customer applications in a fast-paced, iterative environment. All of this is great, yet we also discussed how current DevOps processes may come up a step…

Read More

The Top Three Cyber Attack Threats that Cause a Financial CISO to Lose Sleep

We recently had the chance to hear a presentation by the chief information security officer of a leading financial services firm, which gave a number of valuable insights into today’s top security challenges. To set the stage, the speaker shared recent cyber attacks that may not have caught an individual’s attention but definitely made financial…

Read More

Security Challenges Related to Containers

The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of slowing down, but it raises many new security challenges. This article takes a closer look at these container security issues, why they exist, and the tactics needed to overcome them. Top Container Security Challenges Containers…

Read More

The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

VMworld 2018 started off with a lot of fanfare. VMware CEO Pat Gelsinger kicked the conference off with some mind-boggling statistics: With more than 7,500 customers, VMware NSX has achieved a substantial market leadership position in the software-defined network category – ten times larger than its closest customer. Additionally, VMware’s vSAN software, which is a…

Read More

What is California AB 375, and What Does it Mean for You?

What is the California Data Breach Notification Law (AB 375)? The threat of data breaches in the United States continues to rise, along with the potential impact on the lives of the average consumer. The state of California has led most states in enacting legislation to protect consumers from identity theft, and in fact became…

Read More

What is Foreshadow, and How Can You Overcome this Vulnerability?

What is Foreshadow, and How Can You Overcome this Vulnerability? Earlier this month it was revealed that another vulnerability – the fourth – was discovered in Intel’s x86 chip architecture. Researchers in Belgium originally alerted Intel to this flaw, initially dubbed Foreshadow NG. Intel subsequently discovered an additional Foreshadow flaw in January 2018 but did…

Read More

The Seven Security Sessions Not to Miss at VMworld 2018

  Are you attending VMworld 2018? If you’re attending VMworld 2018 and trying to weed through the 600+ sessions to decide what to attend it can be daunting. You only have a limited about of time to get the information you need. To help, we’ve compiled the top seven presentations for anyone interested in application…

Read More

Everything You Need to Know About Cyber Insurance Policy Coverage

As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other business services, the need for cyber insurance is becoming more important. However, paying attention to the details is crucial to understanding what kind of insurance an organization requires and under what circumstances reimbursement is declined. In a…

Read More

The FTC: The Law and Order of Cyber Attacks

Understanding the FTC’s Role in the investigation and enforcement of cyber attacks In a previous blog, we discussed the FTC and its role in enforcing various data privacy policies. In this article, we’ll take a closer look at how it developed into the main cyber enforcement body, how it assesses liability, and a sample of…

Read More

CSPi Expands Partner Network Domestically and Internationally with Additions of Egoseal and Chestnut Hill Technologies
Learn More