Results for Search Submit Filter by: Advanced Filter All results Solutions Industry People Client Story Insights/Blogs Filter Blog August 20, 2020 7 Leading Practices for Site Reliability Engineering We often see operations and development teams collaborate with each other to achieve service or product delivery goals aligned with business objectives. Often, they have different objectives in mind, with the development team focused on faster deployment of code and the operations team focused on effective service management or incident response process. To make production operations management… Blog September 16, 2020 CISOs: Security Program Reassessment in a Dynamic World Changing Times Time has certainly altered my perspective, but I think we can all agree the world has changed incredibly in just the last few months. The good news is that, while many of us have been through significant changes or challenges in our past, we have always found a way… Blog September 9, 2020 Research, Build, Break, Tinker: Developing a Thermal Sensor Solution The COVID-19 pandemic has upended much of our world’s traditional operations. The challenges brought about have forced organizations to quickly adapt to new ways of doing business in order to keep essential services running, while simultaneously developing plans to bring schools, offices, restaurants and more back online. The disruption brought on by COVID-19 has given us an opportunity to bring… Blog September 17, 2020 4 Ways to Effectively Design and Configure Workday Security Given the size and complexity of most organizations, effectively managing user access to Workday can be challenging. Defining adequate security policies and requirements will enable a clean security role design with few or no unmitigated risks of which the organization is not aware. It is important to have a well-designed and strong security architecture within Workday to ensure smooth business… Blog September 14, 2020 Source Code Repositories and Mishandled Secrets As the DevOps revolution continues to sweep across the IT landscape, source code repositories have become a prominent resource for most organizations. They provide a centralized place to track, document and collaborate on changes to applications and are a critical component of modern continuous integration/continuous delivery (CI/CD) workflows. The automation of the technology stack necessary to… Blog September 10, 2020 Is Software Defined Perimeter the Best Method for Adopting a Zero Trust Strategy? Enterprise networks have been described as being like an egg, with a hard shell on the outside and soft on the inside. There have been heated dialogues between security professionals that treat the "insiders" as trusted and anything outside the network as a threat. However, this thought process began to change after the introduction of Zero… Whitepaper September 20, 2020 Early Signs of Regulatory Alignment on Operational Resilience Concepts, Themes In early August 2020, the Basel Committee on Banking Supervision (BCBS) released a consultative document, titled “Principles for Operational Resilience,” that proposed a pragmatic yet flexible approach to operational resilience, one intended to be principles-based. Publication of the consultative document was expected and timely, coming amid a growing regulatory focus on operational risks and the… Blog September 28, 2020 The End of EU-U.S. Privacy Shield On July 16, 2020, the European Court of Justice (CJEU) issued a landmark ruling in case C-311/18 - Data Protection Commissioner v Facebook Ireland and Maximillian Schrems (more commonly referred to as Schrems II). The court found that U.S. national intelligence laws (FISA 702 and Executive Order 12333) provide inadequate privacy protection for EU… Blog October 12, 2020 Establishing Foundational Cloud Governance Organizations are struggling with how to structure their cybersecurity and risk management programs in cloud environments. They are failing to understand the frameworks and resources available to them to securely configure and audit their cloud footprints. In some cases, organizations are moving to the cloud with architectures that fail to adapt to the paradigms of cloud computing… Blog September 29, 2020 Cybersecurity Threats: Gain Visibility to Detect Events with Microsoft Azure Sentinel Organizations spend significant time and resources determining the safest way to transition to, or maintain, a cloud environment. However, given the impact over the last six months from the COVID-19 pandemic, active phishing websites have increased by 350 percent affecting both organizations and individuals who have been hacked or have fallen for phone pleas for medical supplies, donations and… Load More