Analyzing the Security Management of Docker
Posted on: 26 Nov 2014
It’s the holiday season, which means that many of us are already in the process (or soon will be) of putting up holiday decorations. Ordinarily that wouldn’t be particularly noteworthy…
Legacy Security Controls: Time to Pull the Plug?
Posted on: 23 Oct 2014
It’s a fact of life that most IT shops have, to one degree or another, a “security products graveyard” – i.e. security technology that’s past its prime, performing poorly, or…
5 Strategies to Combat Shadow IT
Posted on: 11 Sep 2014
In today’s businesses, it seems like the technology landscape is changing ever more rapidly. For most firms, IT has become a veritable parade of transformative and disruptive technology: cloud, mobility,…
Getting your AppSec program ready for DevOps
Posted on: 10 Jul 2014
You know the illustration The March of Progress? The name itself might not ring a bell for everyone, but more than likely you’ve seen it: it’s the illustration showing human…
4 Warning Signs Your Pentester Isn’t “Getting It”
Posted on: 30 Apr 2014
When it comes to penetration testing, it’s a fact that many organizations will engage third party consultants to perform the service. The reasons why this is so aren’t hard to…
Dormant VM Images: A Sealed Box of Evil?
Posted on: 26 Mar 2014
Imagine for a moment a villain (or villains) trapped powerless for years. After being reanimated by an unsuspecting populace, the newly-released evil goes forth to wreak havoc until it’s only once…