6 04, 2021

How to Stop a DDoS Attack Before It Happens

By |2021-04-06T09:59:59-07:00April 6th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

For any business that primarily interacts and does transactions with users online, the last thing you want potential or long-standing customers to see when they are trying to connect with you is the dreaded 404 error screen. It is true that in some cases, this error could indicate a problem [...]

23 03, 2021

Balancing Risk in CIA Triad Availability

By |2021-04-07T08:53:59-07:00March 23rd, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

The CIA triad's availability component breaks down to risk management. Organizations need to review their data and consider the risk they're willing to accept in exchange for the convenience of making it available. When those two fall out of balance, breaches occur, or clients can't access the information they need.  [...]

11 03, 2021

6 Top Cloud Security Trends

By |2021-03-11T11:49:20-08:00March 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

Whenever someone approaches me with the option of hearing the good news or bad news first, I typically try to predict whether the gist of the report is dire or if the good news will outweigh the bad. Based on this prediction, I will request one or the other first, [...]

23 02, 2021

Assessing Cyber Security Risks: How to Perform an Assessment in 7 Steps

By |2021-02-23T11:29:06-08:00February 23rd, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

Any enterprise or company that considers all the talk about cybersecurity to be overblown need only look to the recent SolarWinds breach for validation that cloud security risks are all too real. SolarWinds provides a wide range of services, including network, database, and application and server management to a large [...]

11 02, 2021

Applying a Zero Trust Infrastructure in Kubernetes

By |2021-02-11T11:21:51-08:00February 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

For most businesses today, there is no greater concern than the cloud security risks that may threaten your operations and resources. There are many reasons and advantages to making a digital transformation; however, the biggest threat is neglecting to devise a plan or strategy to guard against cloud security vulnerabilities [...]

26 01, 2021

Managing 3rd Party Cyber Risk In A Rapidly Evolving Landscape

By |2021-01-26T14:11:52-08:00January 26th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

Venturing into and then taming the unknown has always been a human endeavor. Over history, each expansion has usually included the incorporation of new peoples, entities, languages, and other means of communication. For example, during the global pandemic of 1918-19, we were severely handicapped by the inability to transfer and [...]

5 11, 2020

What is Cyber Threat Intelligence?

By |2021-02-01T09:40:36-08:00November 5th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI)|

Fortunately, most people are not proponents or fans of armed conflict, especially on the nation-state level where the resulting destruction can be unimaginable. Yet, the wise among us realize that not being prepared to defend yourself, if necessary, can render you vulnerable to those with bad intentions. However, successfully battling [...]

15 10, 2020

Cloud Security Vulnerabilities: A Step-by-Step Plan for Quelling Threats

By |2020-10-15T12:28:05-07:00October 15th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

When referring to the global network of computing resources that house and drive data and information interchanges today, many use the term “cloud” or “cloud computing.” From a holistic vantage point, this nomenclature has merit similar to that of the expression network used when describing a LAN, WAN, or MAN. [...]

6 10, 2020

Data Security for Banks: Standards for Success

By |2020-10-06T11:25:28-07:00October 6th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

Data breaches are perhaps the single most significant risk that banks face today. In the financial industry, the cost per data breach averaged about $5.85 million in 2020. Aside from the direct costs involved in these breaches, like lost funds, increased insurance expenses and fines, and penalties, institutions also must [...]

26 09, 2019

New Context and Idaho National Laboratory to Develop Operational Cybersecurity Technology

By |2019-10-31T09:43:40-07:00September 26th, 2019|Categories: Cyber Threat Intelligence (CTI), News & Press Releases|

New Context collaborates with U.S. Department of Energy and Idaho National Laboratory to help protect U.S. critical infrastructure from cyber threats.   SAN FRANCISCO--(BUSINESS WIRE)--September 26, 2019-- New Context, a leading innovator in cybersecurity research for highly regulated industries, today announced its ongoing collaboration with the U.S. Department of Energy [...]

Load More Posts
Go to Top