Cybersecurity Blog

Featured Post

Five Best Practices to Achieving a Secure DevOps Model

The first article in our two-part series introduced the concept of a “whole brain” approach to achieving secure DevOps. This article continues the discussion by taking a closer look at the five best practices every organization should implement to achieve a secure DevOps model. Designing a "whole...

( read )

Tags: secdevops, cybersecurity, data protection

Top 4 Cybersecurity Trends & Developments in 2018
Our last blog of 2018 takes a closer look at four critical security developments and trends … and how we can apply to improve...

( read )

Tags: cyber attack, cybersecurity, intrusion response,

What is the Consumer Data Protection Act of 2018?
What is the Consumer Data Protection Act of 2018? It’s a struggle for organizations to keep track of all of the data privacy...

( read )

Tags: data breach, cybersecurity, data protection

Security Challenges Related to Containers
The use of containers has become integral to application development processes. The trend shows no sign of slowing down, but it...

( read )

Tags: data breach, secdevops, cybersecurity,

VMworld 2018 Highlights Storage Drives Lack Cyber Security

Given the market success and flexibility of the vSAN and NSX solutions, VMware enables partners to provide additional...


( read )

Tags: data breach, cybersecurity, data protection