Learn more about CSPi’s innovative security and HIPAA compliance solutions at the HIMSS19 Global Conference & Exhibition, February 10-15 in Orlando, FL.
The first article in our two-part series introduced the concept of a “whole brain” approach to achieving secure DevOps. This article continues the discussion by taking a closer look at the five best practices every organization should implement to achieve a secure DevOps model. Designing a “whole brain” approach to SecDevOps is challenging, but not…
Our last blog of 2018 takes a closer look at four critical security developments and trends … and how we can apply to improve security and compliance in 2019. Whether you’re looking for a better way to manage the inevitable breach, comply with an increasingly complex landscape of data privacy regulations, or determine how you…
What is the Consumer Data Protection Act of 2018? It’s a struggle for organizations to keep track of all of the data privacy laws by state, country, or industry, but also, and more importantly, to ensure compliance with their varying requirements. A proposed new data privacy law takes a hard line on personal data usage…
To be confident that their applications and associated data are protected from the start of development, organizations need to take a holistic view to the concept of Secure DevOps by addressing security considerations upfront during planning and development. Now there’s a way to let right-brain application developers and left-brain security teams focus on what they…
A first article examined DevOps and questioned why security usually isn’t added early enough in application development processes, and as a result, lead to application and data security becoming an afterthought. In this second article, we look at new recommendations and specific best practices companies should consider to make current DevOps methodologies more secure, by creating…
We recently had the chance to hear a presentation by the chief information security officer of a leading financial services firm. What security issues are keeping this individual awake at night? We were curious to hear, and some of the answers may surprise you. In this article, we will offer some valuable insights into today’s top…
While the benefits of the DevOps methodology are well understood, as an industry we haven’t done enough to add security earlier in the application development process. In the first of a two-part blog series, we take a look at why this challenge exists, the risks it presents, and its overall business impact. Stay tuned for…
The use of containers has become integral to application development processes. The trend shows no sign of slowing down, but it raises new security challenges. As is the case with so many technologies, containers were not created with security in mind. In this article, we take a closer look at these container security issues, why…
Given the market success and flexibility of the vSAN and NSX solutions, VMware enables partners to provide additional capabilities – like security. One key observation from the recent VMworld 2018 conference, is that Security-in-Depth needs to become the de facto approach for security. Continue reading this article to learn more about the Security-in-Depth model and…