One of the most difficult concepts to wrap your head around has to be infinity. Perhaps imagining that anything can last forever is difficult because of our initial indoctrination to the “everything has a beginning and an ending” perspective. However, we must eventually either accept the notion of infinity—or at [...]
The best way to approach DIE model security vs. the CIA security triad is to eliminate the "versus." The DIE model is designed to build on the traditional CIA triad, making them complementary, not competitive. The CIA security triad manages data through confidentiality, integrity and access. Meanwhile, the DIE model [...]
Data is a top-of-mind issue for many organizations today because of the need for a balance between access and security. They collect data for a reason: to improve their business. However, a data breach could do the exact opposite. By embracing automation and governance as data pipeline tools, organizations can [...]
Undoubtedly you will find many blog posts and books on the subject of cybersecurity and DevSecOps metrics. While all those metrics are valuable to various stakeholders, when we talk to our executive leadership and board members, they scream for simplicity. Our LS/IQ virtual CISO customers often struggle with effective means [...]
Any enterprise or company that considers all the talk about cybersecurity to be overblown need only look to the recent SolarWinds breach for validation that cloud security risks are all too real. SolarWinds provides a wide range of services, including network, database, and application and server management to a large [...]
By Alyce Hayes|2021-02-22T12:49:25-08:00February 22nd, 2021|Categories: Blog|
As a company in the tech industry, New Context continuously strives to make our environment more inclusive to underrepresented groups. We know that when it comes to the STEM disciplines, the representation of black people is exceedingly low for a host of reasons. But one of the best ways to [...]
If a single solution to cloud security management existed, we would not need an article like this nor would a company ever need to make the weighty decision of choosing between one service or another. Much like there is no single marketing or business strategy that works for all companies, [...]
For most businesses today, there is no greater concern than the cloud security risks that may threaten your operations and resources. There are many reasons and advantages to making a digital transformation; however, the biggest threat is neglecting to devise a plan or strategy to guard against cloud security vulnerabilities [...]
The work we perform on behalf of our clients is typically classified as “development,” or "DevSecOps," or “cloud native.” Each of these monikers implies a direct application of our engineering know-how. It’s true that there is almost always a hands-on portion to the work we perform on behalf of clients, [...]
Pets vs. cattle is an analogy with modest beginnings that has grown into an industry staple. A simple Google search will spawn more than four million results and a myriad of developer memes. It's important because of the way infrastructures have changed since the early days of the internet, and [...]
In today’s market, you need a data security partner as committed to your client’s safety as you are. At New Context our experts can build and maintain a holistic data platform custom-tailored to your needs—so you can focus on your customers, not their data.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.