25 02, 2021

Data Pipeline Tools: Mapping a Path Through Digital Convergence

By |2021-02-25T08:33:36-08:00February 25th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

Data is a top-of-mind issue for many organizations today because of the need for a balance between access and security. They collect data for a reason: to improve their business. However, a data breach could do the exact opposite. By embracing automation and governance as data pipeline tools, organizations can [...]

24 02, 2021

Simple DevSecOps Metrics Matter

By |2021-02-24T13:38:03-08:00February 24th, 2021|Categories: Blog, DevSecOps, LS/IQ, Virtual CISO|

Undoubtedly you will find many blog posts and books on the subject of cybersecurity and DevSecOps metrics. While all those metrics are valuable to various stakeholders, when we talk to our executive leadership and board members, they scream for simplicity. Our LS/IQ virtual CISO customers often struggle with effective means [...]

23 02, 2021

Assessing Cyber Security Risks: How to Perform an Assessment in 7 Steps

By |2021-02-23T11:29:06-08:00February 23rd, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

Any enterprise or company that considers all the talk about cybersecurity to be overblown need only look to the recent SolarWinds breach for validation that cloud security risks are all too real. SolarWinds provides a wide range of services, including network, database, and application and server management to a large [...]

16 02, 2021

Top 6 Cloud Security Management Policies and Procedures to Protect Your Business

By |2021-02-16T13:55:36-08:00February 16th, 2021|Categories: Blog, Critical Infrastructure|

If a single solution to cloud security management existed, we would not need an article like this nor would a company ever need to make the weighty decision of choosing between one service or another. Much like there is no single marketing or business strategy that works for all companies, [...]

11 02, 2021

Applying a Zero Trust Infrastructure in Kubernetes

By |2021-02-11T11:21:51-08:00February 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

For most businesses today, there is no greater concern than the cloud security risks that may threaten your operations and resources. There are many reasons and advantages to making a digital transformation; however, the biggest threat is neglecting to devise a plan or strategy to guard against cloud security vulnerabilities [...]

10 02, 2021

Cloud Native Data Migration: A Relativity Case Study

By |2021-02-10T06:57:29-08:00February 10th, 2021|Categories: Blog, Case Studies|

The work we perform on behalf of our clients is typically classified as “development,” or "DevSecOps," or “cloud native.” Each of these monikers implies a direct application of our engineering know-how. It’s true that there is almost always a hands-on portion to the work we perform on behalf of clients, [...]

9 02, 2021

Pets vs. Cattle: More Than an Analogy for Modern Infrastructures

By |2021-02-09T11:02:27-08:00February 9th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

Pets vs. cattle is an analogy with modest beginnings that has grown into an industry staple. A simple Google search will spawn more than four million results and a myriad of developer memes. It's important because of the way infrastructures have changed since the early days of the internet, and [...]

4 02, 2021

Kubernetes Deployment vs. Service: Managing Your Pods

By |2021-02-04T12:06:20-08:00February 4th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

It is hard to argue that the use of Kubernetes is not increasing. In fact, the Cloud Native Computing Foundation (CNCF) reports 83% Kubernetes usage during production from respondents to its 2020 survey—this is up from 23% in 2016. Apparently, the novelty of the Kubernetes container management architecture, or K8s, [...]

2 02, 2021

5 Cloud Security Compliance Basics to Prevent Data Breaches

By |2021-02-02T14:50:39-08:00February 2nd, 2021|Categories: Blog, Critical Infrastructure, DevSecOps, Secure Compliant Data Platform|

Cloud security compliance leads the list of issues facing most enterprises today. Amid the mass migration due to COVID-19 and new work from home policies, cloud-based attacks jumped 630%. Many of these attacks occurred because companies weren't ready to make the transition and accelerated their digital transformation efforts to the [...]

Load More Posts
Go to Top