29 04, 2021

Utilizing Cloud Native Kubernetes Deployment for a More Secure Configuration

By |2021-04-29T11:20:11-07:00April 29th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

The first thing to know about cloud native Kubernetes is that it's not a plug-and-play option. Kubernetes doesn't provide any security benefit by default. It has a lot of supportive features, but that's never the primary focus. Where the program really shines is in its policy enforcement, which is essential [...]

27 04, 2021

Top 3 Data Compliance Challenges of Tomorrow and the Solutions You Need Today

By |2021-04-27T11:41:32-07:00April 27th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

One of the biggest challenges facing companies today is managing data. The sheer amount of data we’re responsible for in this day and age is staggering, and keeping that data private and secure is a constant battle when our business is increasingly being conducted online. To make things even more [...]

22 04, 2021

Cloud Native Applications: 5 Characteristics to Look for in the Right Tools

By |2021-04-22T08:58:14-07:00April 22nd, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

Moving from traditional or on-premise hosting to a cloud native environment is quite a transition—and it's one that many are considering right now. While most companies have migrated to the cloud in some form or another, nearly one-third of organizations have not adopted any cloud native infrastructure. Those who are [...]

15 04, 2021

Cloud Agnostic vs Cloud Native: Developing a Hybrid Approach

By |2021-04-15T09:18:52-07:00April 15th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

It isn't easy to compare and contrast cloud native vs. cloud agnostic because they're not competing principles. In most cases, they work together to provide independence and flexibility to organizations. Cloud native is more of a philosophy that drives resilience and scalability. Meanwhile, cloud agnosticism centers on eliminating dependence upon [...]

8 04, 2021

Cloud Native Principles: How to Put Fundamentals Into Practice

By |2021-04-08T09:15:07-07:00April 8th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps, Secure Compliant Data Platform|

A driving motivation of cloud native philosophy is to get away from the stagnant ideas of the past that tied companies to specific processes and strategies. It's a program that can transcend industries. Regardless of whether a company is in finance, retail, utilities, or another field, overarching cloud native principles [...]

30 03, 2021

How Data Portability Can Be Managed Securely

By |2021-03-30T14:24:21-07:00March 30th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps, Secure Compliant Data Platform|

Data portability is a concept that centers on access because it prevents information from being trapped in a single program. Data isolation makes it challenging to create backups necessary for system continuity and prevents users from moving platforms as they choose, so mobility is a necessity. However, providing essential access [...]

25 03, 2021

API Endpoint Definition and Implementation

By |2021-03-25T09:38:35-07:00March 25th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

If you are a watcher of classical movies (or have just been coerced into watching them by someone else), then you may recall viewing a switchboard scene where a row of employees are frantically trying to connect incoming callers to the appropriate department or individual within their organization. Although these [...]

18 03, 2021

The Best Cloud Security Guidelines for Managing Data Usage and Risks

By |2021-03-18T12:45:09-07:00March 18th, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

Humans tend to process data in a visual format more readily than other communication forms, such as oral or text-based. This is true not only for processing, but also for assessing the accuracy of the information presented. Noteworthy studies indicate that visual data or imagery is the most trusted resource [...]

11 03, 2021

6 Top Cloud Security Trends

By |2021-03-11T11:49:20-08:00March 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

Whenever someone approaches me with the option of hearing the good news or bad news first, I typically try to predict whether the gist of the report is dire or if the good news will outweigh the bad. Based on this prediction, I will request one or the other first, [...]

2 03, 2021

Making DIE Model Security vs. the CIA Security Triad Complementary, Not Competitive

By |2021-03-02T09:21:13-08:00March 2nd, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

The best way to approach DIE model security vs. the CIA security triad is to eliminate the "versus."  The DIE model is designed to build on the traditional CIA triad, making them complementary, not competitive. The CIA security triad manages data through confidentiality, integrity and access. Meanwhile, the DIE model [...]

Load More Posts
Go to Top