25 02, 2021

Data Pipeline Tools: Mapping a Path Through Digital Convergence

By |2021-02-25T08:33:36-08:00February 25th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

Data is a top-of-mind issue for many organizations today because of the need for a balance between access and security. They collect data for a reason: to improve their business. However, a data breach could do the exact opposite. By embracing automation and governance as data pipeline tools, organizations can [...]

24 02, 2021

Simple DevSecOps Metrics Matter

By |2021-02-24T13:38:03-08:00February 24th, 2021|Categories: Blog, DevSecOps, LS/IQ, Virtual CISO|

Undoubtedly you will find many blog posts and books on the subject of cybersecurity and DevSecOps metrics. While all those metrics are valuable to various stakeholders, when we talk to our executive leadership and board members, they scream for simplicity. Our LS/IQ virtual CISO customers often struggle with effective means [...]

23 02, 2021

Assessing Cyber Security Risks: How to Perform an Assessment in 7 Steps

By |2021-02-23T11:29:06-08:00February 23rd, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

Any enterprise or company that considers all the talk about cybersecurity to be overblown need only look to the recent SolarWinds breach for validation that cloud security risks are all too real. SolarWinds provides a wide range of services, including network, database, and application and server management to a large [...]

11 02, 2021

Applying a Zero Trust Infrastructure in Kubernetes

By |2021-02-11T11:21:51-08:00February 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

For most businesses today, there is no greater concern than the cloud security risks that may threaten your operations and resources. There are many reasons and advantages to making a digital transformation; however, the biggest threat is neglecting to devise a plan or strategy to guard against cloud security vulnerabilities [...]

9 02, 2021

Pets vs. Cattle: More Than an Analogy for Modern Infrastructures

By |2021-02-09T11:02:27-08:00February 9th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

Pets vs. cattle is an analogy with modest beginnings that has grown into an industry staple. A simple Google search will spawn more than four million results and a myriad of developer memes. It's important because of the way infrastructures have changed since the early days of the internet, and [...]

4 02, 2021

Kubernetes Deployment vs. Service: Managing Your Pods

By |2021-02-04T12:06:20-08:00February 4th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

It is hard to argue that the use of Kubernetes is not increasing. In fact, the Cloud Native Computing Foundation (CNCF) reports 83% Kubernetes usage during production from respondents to its 2020 survey—this is up from 23% in 2016. Apparently, the novelty of the Kubernetes container management architecture, or K8s, [...]

2 02, 2021

5 Cloud Security Compliance Basics to Prevent Data Breaches

By |2021-02-02T14:50:39-08:00February 2nd, 2021|Categories: Blog, Critical Infrastructure, DevSecOps, Secure Compliant Data Platform|

Cloud security compliance leads the list of issues facing most enterprises today. Amid the mass migration due to COVID-19 and new work from home policies, cloud-based attacks jumped 630%. Many of these attacks occurred because companies weren't ready to make the transition and accelerated their digital transformation efforts to the [...]

28 01, 2021

Tech Startups: Add These Product Security Features Right Now

By |2021-01-29T08:53:30-08:00January 28th, 2021|Categories: DevSecOps, LS/IQ, Secure Software Development, Virtual CISO|

Our LS/IQ virtual CISO customers often struggle to balance making new features instead of spending time building security features. Engineering managers in small tech companies always prefer to sit down and code the next big thing to sell their product. Adding security controls early in a [...]

28 01, 2021

DevOps to DevSecOps: How to Build Security into the Development Lifecycle

By |2021-01-28T10:47:08-08:00January 28th, 2021|Categories: Blog, DevSecOps|

DevSecOps is a new way of making security a focal point in any DevOps practice. Building security into the foundation of an application or program allows enterprises to protect their product and users without issuing hundreds of patches and updates. The funny thing is, if people were doing it right [...]

26 01, 2021

Managing 3rd Party Cyber Risk In A Rapidly Evolving Landscape

By |2021-01-26T14:11:52-08:00January 26th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

Venturing into and then taming the unknown has always been a human endeavor. Over history, each expansion has usually included the incorporation of new peoples, entities, languages, and other means of communication. For example, during the global pandemic of 1918-19, we were severely handicapped by the inability to transfer and [...]

Load More Posts
Go to Top