Importance of Vulnerability Management

The number of attacks like the recent one against Equifax have risen dramatically in the last few years, resulting in the exposure of hundreds of millions of private records. Almost without exception there has been some fundamental flaw related to configuration or patching of systems. This trend will continue without systems designed to automatically identify, [...]

By |Uncategorized|Comments Off on Importance of Vulnerability Management

Planning for Disaster Recovery

Given the constant and connected nature of software driven businesses, customers and users have grown to be less forgiving and more fickle with their attention. An outage in a single service can impact all of its users. An outage in a multi-tenant platform has an exponential impact as it impacts the users of all the [...]

By |Uncategorized|Comments Off on Planning for Disaster Recovery

CPU Exploits: Understanding Meltdown & Spectre

Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. Security researchers working for Google’s Project Zero group, along with other research groups and academic institutions, have discovered a series of far-ranging security risks involving speculative execution. Speculative execution is one [...]

By |Uncategorized|Comments Off on CPU Exploits: Understanding Meltdown & Spectre

Serverless computing

How does renting computing horsepower sound. Rather than taking the complications of designing and managing cloud architecture, some CIOs are going “serverless.” With serverless computing, cloud instances are no longer allocated, only to sit idle until called upon to fuel applications and other functions. Rather, resources are provisioned only when a specific event occurs. When [...]

By |Uncategorized|Comments Off on Serverless computing

Lack of C-level Oversight in Security

Despite all the attention that massive hacks and other breaches have attracted in recent years, organizations everywhere still struggle to comprehend the scale of and manage emerging cyber-risks. Of the more than 9,500 senior executives in 122 countries who participated in PricewaterhouseCoopers' Global State of Information Security Survey (GSISS) 2018, only 39% say they are [...]

By |Uncategorized|Comments Off on Lack of C-level Oversight in Security
Go to Top