When it Comes to Container Security Enterprises Are Their Own Worst Enemy

Much like the early days of virtualization, containers got a bum rap when it came to data security. I say this because just like virtualization, securing containers is more about securing what is happening inside, rather than the security of the w… Continue reading When it Comes to Container Security Enterprises Are Their Own Worst Enemy

Microsoft’s Johnson: Data Breach Disclosures a Delicate Balance

Whether it’s the Equifax breach or the more recent Facebook breach, consumers are steeped in data breach news and notifications. During the Washington Post’s Cybersecurity Summit | 2018, Cat Zakrzewski, a technology policy reporter at the W… Continue reading Microsoft’s Johnson: Data Breach Disclosures a Delicate Balance

Secretary of Homeland Security: We’re Ready for Election Day Interference

About a month ahead of the midterm elections, the Washington Post’s cybersecurity reporter Derek Hawkins interviewed Kirstjen Nielsen, United States Secretary of Homeland Security, about the current state of the nation’s election security. The intervi… Continue reading Secretary of Homeland Security: We’re Ready for Election Day Interference

As Bots and Robotic Processes Rise in the Enterprise, so Do Security Risks

As business-technology systems grow more complex, so does the need to automate essential management and security processes. With hybrid cloud architectures, DevOps management approaches, and continuous software delivery pipelines, organizations ne… Continue reading As Bots and Robotic Processes Rise in the Enterprise, so Do Security Risks

Application Security and DevOps: Q&A with Author Kenneth Van Wyk

Application security is one of the most important topics in information security, and few know the subject better than Kenneth Van Wyk. He has been a career IT security expert for more than 30 years and specializes in both incident response and softwa… Continue reading Application Security and DevOps: Q&A with Author Kenneth Van Wyk