To be confident that their applications and associated data are protected from the start of development, organizations need to take a holistic view to the concept of Secure DevOps by addressing security considerations upfront during planning and development. Now there’s a way to let right-brain application developers and left-brain security teams focus on what they…
A first article examined DevOps and questioned why security usually isn’t added early enough in application development processes. In this second article, we look at best practices for adding security into DevOps and creating “SecDevOps.”
What security issues are keeping a leading financial services company’s chief information security officer awake at night? We were curious to hear, and some of the answers may surprise you.
While the benefits of the DevOps methodology are well understood, as an industry we haven’t done enough to add security earlier in the application development process. In the first of a two-part blog series, we take a look at why this challenge exists, the risks it presents, and its overall business impact. Stay tuned for…
The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of slowing down, but it raises many new security challenges. This article takes a closer look at these container security issues, why they exist, and the tactics needed to overcome them.
Given the market success and flexibility of the vSAN and NSX solutions, VMware enables partners to provide additional capabilities – like security. One key observation from the recent VMworld 2018 conference, is that Security-in-Depth needs to become the de facto approach.
California’s Data Breach Notification Law was the first of its kind to protect consumers. Yet California has now gone a step further by introducing a new security law, AB 375. Here, we take a look at both of these laws and what it can mean for you (even if your company is not in California).
A closer look at Intel’s latest x86 vulnerability, including details on how CSPi’s new applications can help overcome these security flaws.
If you’re going to VMworld, you really can’t afford to miss any of these seven sessions. Plus, details on visiting CSPi while you’re there.
As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other business services, the need for cyber insurance is becoming more important. However, paying attention to the details is crucial to understanding what kind of insurance an organization requires and under what circumstances reimbursement is declined.