Skip to main content

Posts Tagged ‘security’

How To Get Started With Data Lakes

How to Get Started with Data Lakes

The ability to make better business decisions relies on better access to information, which companies are finding through the implementation of data lakes. Data lakes are centralized repositories that can be used to store all of a company’s structured and unstructured data at any scale. They allow businesses to rapidly harness more data from more […]

Security Concerns

Tackle Security Concerns for Application Modernization

In our previous post, Create Your Transformation Roadmap for Application Modernization, we offered guidance to prepare your organization for successful cloud adoption. Part 2 of this series addresses some of the security concerns you may stumble upon in your cloud journey. We also share some best practices for infusing security across your organization. Questions about […]

How to Create and Configure SSL Key and Trust Stores Part 1/3

This post will be the first in a multi-part series talking about configuring various key stores and trust stores IBM MQ and IBM Integration Bus and populating them with certificates. General Information Key stores and trust stores are files in a proprietary format. Key stores hold certificates that an application sends across during the SSL […]

Application security assessment

How To Use The AWS API With S3 Buckets In Your Pen Test

Pen testers often need to stage payloads and other tools on servers outside of their own infrastructure.  In this post I’ll show you how to use the Amazon AWS command line interface (CLI) to dynamically create and manage S3 buckets that you can use in your own pen tests.  I’ll also show you how to […]

Ransomware Attack Affects 23 Texas Local Government Agencies

In what appears as a highly coordinated attack by a single actor, 23 local government agencies in the state of Texas were hit with ransomware. This extends the recent trend where local government entities were targeted, some of which have led to the attackers being paid millions of dollars via crypto-currency. A first line of […]

Security and Compliance

Security and Compliance in Microsoft Teams

Whether your company has 10 people or 10,000 people, security measures need to be in place to ensure a safe, secure, and compliant environment for your end users. Many companies will often be required to adhere to certain security regulations and compliance standards but rest assured Microsoft has your back.  Microsoft understands this need for […]

Microsoft Intelligent Security Solutions

Part 1 – Microsoft Secure Score 56 Security Actions You Can Take Today to Improve Your Security Posture Microsoft has been investing substantially in security and compliance since 2004, and today that investment protects all Microsoft products, but none more so than Office 365 and Azure. One shining culmination of that investment is Microsoft Secure […]

Boost Cloud Security In Offshore Software Development Projects

Boost Cloud Security in Offshore Software Development Projects

The cloud has changed the business landscape by enabling collaboration on a completely new level, which has resulted in massive leaps in creativity and innovation. Companies can now build teams of highly qualified professionals without worrying about geographical limitations. Organizations no longer need to invest heavily in IT hardware, which implicitly leads to a reduction […]

Automated Security Testing Best Practices

Automated Security Testing Best Practices

Implementing automated security testing throughout the development lifecycle is critical to avoid major problems further down the line. However, when resorting to IT outsourcing, some organizations treat deliverables as separate from their normal pipeline, leading to lax security testing. The problem becomes even more complicated for those organizations that do all their security testing once […]

Azure Active Directory Setup with Multi-Factor Authentication

I was recently asked to setup an eCommerce Windows site environment that can be managed from a centralized location and comply with the Payment Card Industry Data Security Standard (PCI DSS). Active Directory is the solution from where Windows servers can be controlled and managed using Domain Users and Group Policies. However, an additional layer […]

How Reliable Is Automated Security Testing?

How Reliable is Automated Security Testing?

As the Internet of Things expands, software is being embedded in all manner of physical objects. This is boosting the demand for security testing, with automated processes integral to the development pipeline. But not all approaches are created equal. In order for DevSecOps practices to be properly integrated into a product lifecycle, with the right tests […]

The State Of Devsecops In 2019

The State of DevSecOps in 2019

In recent years there has been significant progress integrating security into software development lifecycles. However, software security is necessarily dynamic and evolving, which inevitably results in some fallbacks, too. The good news is that, as with any challenge, there are some positive lessons that can give us foresight into where DevSecOps is heading in 2019. […]

Load More