Posts Categorized: Security

Legal’s Growing Interest in Cyber Security

Meeting Compliance Requirements of Data Privacy Regulations Is Becoming a Growing Concern for the Legal Community (In A Good Way) CSPi has been hosting and attending so many great cyber-security events recently. For example, we recently partnered with Cisco to lead three successful security seminars, exhibited at SecureWorld Boston, and co-hosted a great security happy…

Read More

Seven Security Observations

When it comes to data breaches, we seem to have settled into a pattern where each year passes the previous year’s record for total number of breaches. This year-over-year growth is great when it comes to stock performance or portfolio growth, but it’s extremely challenging in the world of corporate security. Unfortunately, this trend shows…

Read More

Combatting Spectre and Meltdown – Just Like 007

If you are a James Bond fan, you will likely remember that Spectre was an archenemy of 007, and in true Bond fashion, 007 successfully saved the world from the world-ending plot Spectre had planned. Therefore, it is quite fitting that Spectre and Meltdown are named for what are likely the worst and most pervasive…

Read More

The Dark Side of a DevOps Environment

Once considered cutting-edge, agile DevOps approach is now recognized by organizations seeking to deliver applications faster and with fewer operations issues. The industry results speak for themselves — a 2016 State of DevOps Report showed that organizations that adhere strongly to agile DevOps spend 29 percent more time on new work (e.g., new features and…

Read More

VMware and NSX: You Can’t Have Your Cake and Eat it Too, Part II

This article is a follow-up from my first blog from September 6. In that article, I reviewed NSX and all of the announcements related to it from VMworld 2017. It really is being set up to become VMware’s hallmark product over the next few years, and overall, VMware has done a very good job with…

Read More

VMware and NSX: You Can’t Have Your Cake and Eat It Too

This the first in a series of blogs where we explore how to take advantage of the NSX open architecture in order to fully leverage the great functionality it can provide for complete network flexibility and security. Having just returned from VMworld 2017, I have to say that it was an eye opener from both…

Read More

Critical Infrastructures and Industry 4.0: The View Is Missing for the Whole

By Ibrahim Koese, Head of Technology & Consulting, CSPi Germany Recent cybersecurity events show that the readiness for large-scale attacks on critical infrastructures have grown dramatically. It can’t be ruled out that this is only a harbinger, or a “proof of concept” for larger attacks. A few years ago, only a few isolated attacks on…

Read More

Let’s Face It: You’re a Hack Just Waiting to Happen

The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner year for the number of successful cyber breaches against US organizations. One notable takeaway: “If the number of breaches stays on pace with those reported in the first half of 2017, we’ll achieve…

Read More

CSPi Expands Partner Network Domestically and Internationally with Additions of Egoseal and Chestnut Hill Technologies
Learn More