Blog2020-11-18T16:44:28-08:00

Blogs on transforming your data platform with DevSecOps

Decoding Your DevOps Lifecycle to Optimize Processes More Effectively

By |March 4th, 2021|Categories: Blog, DevSecOps, LS/IQ|

One of the most difficult concepts to wrap your head around has to be infinity. Perhaps imagining that anything can last forever is difficult because of our initial indoctrination to the “everything has a beginning and an ending” perspective. However, we must eventually either accept the notion of infinity—or at [...]

Making DIE Model Security vs. the CIA Security Triad Complementary, Not Competitive

By |March 2nd, 2021|Categories: Blog, DevSecOps, Secure Compliant Data Platform|

The best way to approach DIE model security vs. the CIA security triad is to eliminate the "versus."  The DIE model is designed to build on the traditional CIA triad, making them complementary, not competitive. The CIA security triad manages data through confidentiality, integrity and access. Meanwhile, the DIE model [...]

Data Pipeline Tools: Mapping a Path Through Digital Convergence

By |February 25th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

Data is a top-of-mind issue for many organizations today because of the need for a balance between access and security. They collect data for a reason: to improve their business. However, a data breach could do the exact opposite. By embracing automation and governance as data pipeline tools, organizations can [...]

Simple DevSecOps Metrics Matter

By |February 24th, 2021|Categories: Blog, DevSecOps, LS/IQ, Virtual CISO|

Undoubtedly you will find many blog posts and books on the subject of cybersecurity and DevSecOps metrics. While all those metrics are valuable to various stakeholders, when we talk to our executive leadership and board members, they scream for simplicity. Our LS/IQ virtual CISO customers often struggle with effective means [...]

Assessing Cyber Security Risks: How to Perform an Assessment in 7 Steps

By |February 23rd, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

Any enterprise or company that considers all the talk about cybersecurity to be overblown need only look to the recent SolarWinds breach for validation that cloud security risks are all too real. SolarWinds provides a wide range of services, including network, database, and application and server management to a large [...]

Top 6 Cloud Security Management Policies and Procedures to Protect Your Business

By |February 16th, 2021|Categories: Blog, Critical Infrastructure|

If a single solution to cloud security management existed, we would not need an article like this nor would a company ever need to make the weighty decision of choosing between one service or another. Much like there is no single marketing or business strategy that works for all companies, [...]

Applying a Zero Trust Infrastructure in Kubernetes

By |February 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

For most businesses today, there is no greater concern than the cloud security risks that may threaten your operations and resources. There are many reasons and advantages to making a digital transformation; however, the biggest threat is neglecting to devise a plan or strategy to guard against cloud security vulnerabilities [...]

Cloud Native Data Migration: A Relativity Case Study

By |February 10th, 2021|Categories: Blog, Case Studies|

The work we perform on behalf of our clients is typically classified as “development,” or "DevSecOps," or “cloud native.” Each of these monikers implies a direct application of our engineering know-how. It’s true that there is almost always a hands-on portion to the work we perform on behalf of clients, [...]

Pets vs. Cattle: More Than an Analogy for Modern Infrastructures

By |February 9th, 2021|Categories: Blog, Critical Infrastructure, DevSecOps|

Pets vs. cattle is an analogy with modest beginnings that has grown into an industry staple. A simple Google search will spawn more than four million results and a myriad of developer memes. It's important because of the way infrastructures have changed since the early days of the internet, and [...]

Keeping the
Connected
World Safe

In today’s market, you need a data security partner as committed to your client’s safety as you are. At New Context our experts can build and maintain a holistic data platform custom-tailored to your needs—so you can focus on your customers, not their data.

1 (888) 773-8360

Categories

Recent Tweets

Go to Top