Why 6 Security Assessments Are Better Than 1

In addition to helping the world deal with pandemics like COVID-19, the CDC recommends that you get annual health checkups. For many this is a way to prevent illness or catch potential problems before they become too bad. Taking a page from personal health and applying it to the health of your IT infrastructure means that you should consider annual checkups for security vulnerabilities as well. The corollary for a Chief Information Security Officer (CISO) is a security assessment.

BLOG Jun 22

Uncovering Security Vulnerabilities Before You Become A Headline

Some believe that “what you don’t know won’t hurt you.” Others emphatically proclaim that “what you don’t know can (and will) hurt you.” While we would all like to believe the former, the reality is that the latter has proven time and time again to be the case, especially when it comes to security vulnerabilities inadvertently coded into applications, networks, IoT, mobile and cloud infrastructure.

BLOG Jun 01

What Is DevSecOps and Why Should You Care?

Increasingly sophisticated and ever-changing cyber threats require new levels of security assessment, software code development and integration design, oversight, and penetration testing across applications, operating systems, networks, mobile, cloud and the Internet of Things (IoT). This has given rise to a new variation of DevOps that accommodates security. While some call it SecDevOPs and some call it DevOpsSec, the majority have settled on calling it DevSecOps.

BLOG May 18

Internet of Things OWASP Top 10 2018 Released

IoT or the Internet of Things has become a cornerstone of the American consumer and business markets as more and more connected devices are added to the mix every single day. Making sure these systems are secure is extremely important for both security and privacy.  Over the holidays, the 2018 OWASP IoT Top 10 was released.

BLOG Apr 17