Cybersecurity Blog

Featured Post

Security Challenges Related to Containers

The use of containers has become integral to application development processes. The trend shows no sign of slowing down, but it raises new security challenges. As is the case with so many technologies, containers were not created with security in mind. In this article, we take a closer look at...

( read )

Tags: data breach, secdevops, cybersecurity,

VMworld 2018 Highlights Storage Drives Lack Cyber Security

Given the market success and flexibility of the vSAN and NSX solutions, VMware enables partners to provide additional...


( read )

Tags: data breach, cybersecurity, data protection

Everything You Need to Know About Cyber Insurance Policy Coverage
As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other...

( read )

Tags: cyber attack, data breach, cybersecurity,

The Instrumental Role that FTC Plays in Data Privacy Policy and Enforcement

There are always interesting and insightful presentations at the RSA security conference, and this year was no exception.


( read )

Tags: data breach, gdpr, cybersecurity,

DevSecOps vs. SecDevOps vs. DevOpsSec: Is there a difference in these terms?

We all agree we need to secure DevOps, but what should we call it? There are so many terms out there. Whether it is DevSecOps...


( read )

Tags: data breach, secdevops, cybersecurity,