15 06, 2021

An OODA Loop Diagram Approach to Cloud Security

By |2021-06-15T10:59:04-07:00June 15th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

The OODA loop diagram is a military strategy that has been popularized and applied to other stressful, high-risk situations, including network and cloud security breaches. The OODA loop was originally conceptualized by US Air Force Colonel John Boyd to help fighter pilots in combat scenarios gain an advantage over their [...]

10 06, 2021

6 Cloud Security Basics to Get Your Company to the Next Level

By |2021-06-10T10:15:00-07:00June 10th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

The best time to plan and implement a cloud security strategy is before you migrate your data, applications, and infrastructure to a cloud provider. The second best time is right now. Though cloud security involves a lot of moving parts, understanding the cloud security basics is easy and can get [...]

8 06, 2021

Review Your Data Protection Compliance Checklist for These 3 Steps

By |2021-06-08T08:38:35-07:00June 8th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

Every major enterprise has a data protection compliance checklist. It's a necessity to stay up to date in any industry. Compliance failures can create a lot of problems, from fines and penalties to lost client trust. That checklist is the first line of defense to ensure adherence to a complex [...]

4 06, 2021

Comparing Infosec and Cybersecurity: Two Types of Data Security With a Common Goal

By |2021-06-04T10:40:25-07:00June 4th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps, Secure Compliant Data Platform|

Infosec and cybersecurity are two primary concerns for modern organizations. While they're separate areas, they're very closely linked because so much information is in digital storage. This is especially true given the rapid digital acceleration of 2020, where we saw COVID-19 speed the adoption of digital tools by three to [...]

27 05, 2021

What are the Benefits of Principle of Least Privilege (PoLP) for My Organization?

By |2021-05-27T13:37:35-07:00May 27th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

The principle of least privilege, or PoLP, is an information security philosophy that says any user, application, or process should have only the bare minimum network and system permissions necessary to perform its function. When you limit user and application access to only the necessities, you reduce the risk of [...]

25 05, 2021

Building a Data Pipeline Architecture Based on Best Practices Brings the Biggest Rewards

By |2021-05-25T10:47:05-07:00May 25th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

Modern data pipelines are responsible for much more information than the systems of the past. Every day, 2.5 quintillion bytes of data are created, and it needs somewhere to go. A data pipeline is a series of actions that drive raw input through a process that turns it into actionable [...]

18 05, 2021

4 Lean Information Security Lessons to Interface With Your Data Management Philosophy

By |2021-05-18T09:21:59-07:00May 18th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

Lean information security is a method of taking an older concept and applying it to new challenges in an organization. Data is a big part of it. Today, it represents one of a company's most significant assets—and its largest liability. Overall, data breaches cost companies $1.3 billion in 2019. That [...]

13 05, 2021

Beyond Compliance: Data Security and Data Privacy Differences Explained

By |2021-05-13T08:40:53-07:00May 13th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

If your organization collects or manages data, the security and privacy of that data must be one of your top priorities. The handling of sensitive data like identities, finances, or health records requires special attention to stay compliant with privacy regulations and to protect that data from malicious actors. In [...]

7 05, 2021

Data Security Best Practices: Tips for Any Size Organization

By |2021-05-11T09:34:37-07:00May 7th, 2021|Categories: Blog, Critical Infrastructure, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|Tags: , |

No matter how large or small your organization is, the security of your data must be one of your top priorities. While regulations like HIPAA, GDPR, and CCPA provide basic privacy compliance standards for storing, accessing, and transferring information, data security overall is a broader issue that you’ll need to [...]

29 04, 2021

Utilizing Cloud Native Kubernetes Deployment for a More Secure Configuration

By |2021-04-29T11:20:11-07:00April 29th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

The first thing to know about cloud native Kubernetes is that it's not a plug-and-play option. Kubernetes doesn't provide any security benefit by default. It has a lot of supportive features, but that's never the primary focus. Where the program really shines is in its policy enforcement, which is essential [...]

Load More Posts
Go to Top