How Agencies Can Secure Data from Shared Documents After Users Leave
TAGS: data security A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →
How to shift from DevOps to DevSecOps
TAGS: cybersecurity | cybersecurity skills | devops | DevSecOps The worlds of software development and IT have changed tremendously over the last two decades. Software development evolved from the …Continue reading →
How to mitigate an HTTP request smuggling vulnerability
TAGS: HTTPS | vulnerability management | vulnerability testing Load balancers play a crucial role in modern web architectures. In addition to managing the routing of traffic, they also …Continue reading →
The VPN Is Obsolete. Here’s What to Do Instead.
TAGS: VPNs The virtual private network has been a vital enabler of remote work for decades. But the technology, invented in 1996, …Continue reading →
Stateful vs. stateless firewalls: Understanding the differences
TAGS: firewalls | stateful firewall | stateless firewall When considering stateful vs. stateless firewalls, the distinction between the two approaches may sound minor but is actually quite significant. …Continue reading →
Navigate the DOD’s Cybersecurity Maturity Model Certification
TAGS: cybersecurity | cybersecurity skills | DOD In January, the U.S. Department of Defense released the Cybersecurity Maturity Model Certification requirements, outlining new cybersecurity stipulations for DOD …Continue reading →
Secure Your VPN, No Matter What
TAGS: VPN | VPN Security Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →
3 key identity management tips to streamline workflows
TAGS: identity management Identity management is one of the most complex activities undertaken by any IT organization. The nature of the work requires …Continue reading →
How to Stop Phishing Attacks
TAGS: cybersecurity | phishing Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →
IDC PlanScape: Privacy Engineering
TAGS: Privacy Engineering “Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →