Blogs on transforming your data platform with DevSecOps
5 Ways to Stop a Ransomware Attack
The 1920s—often referred to as the “Roaring Twenties”—produced some key historical figures. One of these whose life both inspired and saddened many people around the world was Charles Lindberg. Hailed as an example of the indomitable human spirit for making the first solo non-stop transatlantic flight of over 2000 miles [...]
Cloud Native Principles: How to Put Fundamentals Into Practice
A driving motivation of cloud native philosophy is to get away from the stagnant ideas of the past that tied companies to specific processes and strategies. It's a program that can transcend industries. Regardless of whether a company is in finance, retail, utilities, or another field, overarching cloud native principles [...]
How to Stop a DDoS Attack Before It Happens
For any business that primarily interacts and does transactions with users online, the last thing you want potential or long-standing customers to see when they are trying to connect with you is the dreaded 404 error screen. It is true that in some cases, this error could indicate a problem [...]
How Data Portability Can Be Managed Securely
Data portability is a concept that centers on access because it prevents information from being trapped in a single program. Data isolation makes it challenging to create backups necessary for system continuity and prevents users from moving platforms as they choose, so mobility is a necessity. However, providing essential access [...]
API Endpoint Definition and Implementation
If you are a watcher of classical movies (or have just been coerced into watching them by someone else), then you may recall viewing a switchboard scene where a row of employees are frantically trying to connect incoming callers to the appropriate department or individual within their organization. Although these [...]
Balancing Risk in CIA Triad Availability
The CIA triad's availability component breaks down to risk management. Organizations need to review their data and consider the risk they're willing to accept in exchange for the convenience of making it available. When those two fall out of balance, breaches occur, or clients can't access the information they need. [...]
The Best Cloud Security Guidelines for Managing Data Usage and Risks
Humans tend to process data in a visual format more readily than other communication forms, such as oral or text-based. This is true not only for processing, but also for assessing the accuracy of the information presented. Noteworthy studies indicate that visual data or imagery is the most trusted resource [...]
Maintaining CIA Triad Integrity in a Dynamic Environment
The CIA triad's "integrity" portion was often overlooked in the past. Confidentiality and access gained more attention because data integrity followed, with both equally balanced. However, as new threats emerged with bad actors targeting data not to steal it but to change it, a balance disruption occurred. Integrity in data [...]
6 Top Cloud Security Trends
Whenever someone approaches me with the option of hearing the good news or bad news first, I typically try to predict whether the gist of the report is dire or if the good news will outweigh the bad. Based on this prediction, I will request one or the other first, [...]
Reimagining the CIA Triad Confidentiality Standards for Greater Security
Today, speed to market is a vital factor for organizations. Many have chosen to adopt DevOps principles because the process accelerates product development. However, this acceleration is a culture shift. When it's not treated as such, there is a risk that rapid, unregulated change will result in inadvertently shipping bugs [...]
Follow Us