3 Min Read January 7, 2020

A Cybersecurity Risk Assessment Checklist for Infrastructures in Transition

Dev and Ops teams constantly evolve their technology and procedures to increase speed and lower costs. Typically this leads to increasingly abstracted infrastructure, such as containers, container orchestration, and serverless infrastructure — and while this makes it easier for organizations to advance their technical, operational, and business goals, it simultaneously increases vulnerability to attack, reduces […]

6 Min Read December 5, 2019

How to Transform Alert Fatigue Into Proactive Security Management — 5 Must-Read Blog Posts

The global cybersecurity talent shortage is real, and with 72 percent of CISOs claiming that their teams are facing alert fatigue, there’s not a lot of room for error when it comes to getting accurate, context-rich alerts in front of under-resourced teams. Traditional approaches to managing security alerts have often driven teams into a reactive […]

5 Min Read November 19, 2019

8 Best Practices for Strengthening Security in Cloud-Native Environments

Cloud-native companies and larger companies migrating to cloud environments continue to see the cloud as a way to gain speed, reliability, and other well-known benefits. But there are still plenty of pitfalls that can undermine security and negatively impact operations. To help remedy this situation, this post outlines some of the mistakes that operators make […]

19 Min Read October 10, 2019

20 DevSecOps Pros Reveal the Most Important Considerations in Building a DevSecOps Pipeline

In a recent Threat Stack report, 44 percent of DevOps professionals we surveyed said that when it comes to security-related issues, they’d have to rely on someone else. Even if DevOps pros had the time to dedicate to security issues, many developers lack the expertise needed to improve the security of their applications. What’s more, […]