12 02, 2020

Using Python to Retrieve GCP Stackdriver Monitoring Data

By |2020-02-12T09:58:58-08:00February 12th, 2020|Categories: Articles, Tips & Tricks|Tags: , , , , |

Recently I inherited a complex Google Cloud (GCP) App Engine configuration. App Engine is the managed web server platform, which does not require you to provision/configure/manage your own servers. Some call that serverless.   As I said, it was very complex with some components (services) probably not being used at [...]

16 01, 2019

Real World Crypto 2019

By |2019-10-22T14:02:30-07:00January 16th, 2019|Categories: Articles, Events|Tags: , , |

Real World Crypto Symposium objective is to bring together cryptography researchers with developers implementing cryptography in real-world systems. Last week, the 2019 edition happened in San Jose California. Although I was at CES 2019 contemplating the proliferation of data capturing devices and IA which dominated this year’s gigantic [...]

26 11, 2018

Book Recommendation – The Phoenix Project

By |2019-11-18T09:01:59-08:00November 26th, 2018|Categories: Articles, Tips & Tricks|Tags: , |

Back from Thanksgiving week-end! Aside from my family duties, I took the time this long weekend to read a book that is hopefully a best seller in the DevOps community: “The Phoenix Project” - a Novel by Gene Kim, George Spafford, and Kevin Behr. I had the opportunity [...]

19 11, 2018

Lean Security Assessment Explained

By |2019-10-22T14:04:41-07:00November 19th, 2018|Categories: Articles|Tags: , , , |

Curious about how our Lean Security Assessment process brings Agile, Lean, Security and DevOps together into one practice? Read on. Lean Security Assessment gets you visibility and tools to ensure your data security. The Assessment is broken into 4 main categories of vision, collection analysis and reporting. It follows [...]

1 08, 2018

Demystifying AWS IAM (a little, anyway)

By |2019-10-22T14:08:31-07:00August 1st, 2018|Categories: Articles|Tags: , , , , |

Identity Access Management (IAM) from Amazon Web Services (AWS) provides the tools necessary for AWS customers to create identities and manage the interplay between identities and resources. IAM is different than the traditional permissions based model. Users usually do not have permissions directly assigned to them. Instead, the common model [...]

2 05, 2018

Synthetic identities are growing in power and influence, and the risk to the industrial internet is growing with them.

By |2019-10-22T14:08:45-07:00May 2nd, 2018|Categories: Articles|Tags: , , , |

The solution lies in attribution - critical infrastructure that audits all actors and their actions within a given environment. The recent launch of the SpaceX Falcon Heavy almost broke the internet, but is anyone talking about the online response to Elon Musk’s tweet of the event? That tweetstorm [...]

23 04, 2018

Can the Law Stop Ransomware?

By |2019-10-22T14:09:05-07:00April 23rd, 2018|Categories: Articles|Tags: , , |

The vulnerability of energy and critical infrastructure to cyberattack poses a national security risk. New Context CEO Daniel Riedel was quoted in US News today, commenting-on the growing risk of cyberattack in critical infrastructure, including water, power and telecommunication systems. Alan Neuhauser reports that “lawmakers across the U.S. have [...]

16 04, 2018

Let’s set your DevOps up for success: Andrew Storms featured in the latest publication from DevOps.com

By |2018-04-16T18:43:34-07:00April 16th, 2018|Categories: Articles, Tips & Tricks|Tags: , , , |

Before you start coding or your assessments and security tests, decide what metrics are important that you will use to gauge the effectiveness of your security organization. The newest ebook from DevOps.com has arrived, just in time for RSA 2018 and DevOpsConnect. Our VP of Product Andrew Storms is [...]

11 04, 2018

We’re looking forward to connecting with our clients, colleagues *and you* at RSA in San Francisco

By |2019-10-22T14:09:03-07:00April 11th, 2018|Categories: Articles, Events|Tags: , , , |

Check out our schedule of events and presentations, and contact us to schedule a meeting. Here at New Context we’re passionate about keeping the connected world safe, and we’re looking forward to meeting with you at RSA 2018 in San Francisco to learn about the infosec [...]

3 04, 2018

Kubernetes: Bringing Software Development and Operations Together to Deploy at Scale

By |2019-11-18T09:02:40-08:00April 3rd, 2018|Categories: Articles|Tags: , , , , |

New Context builds and uplifts secure Kubernetes implementations and migrations, from initial design to infrastructure automation and management. DevOps manages how software is deployed and updated at scale, and Kubernetes is an infrastructure framework supporting this model. The modular approach of Kubernetes enables faster development [...]

Load More Posts
Go to Top