Blog

Zero Trust Approach to Security

Organizations must discard the old model of ‘trust but verify’ which relied on well-defined boundaries. The new model of “Zero Trust” mandates a ‘never trust, always verify, enforce least privilege” approach from inside and outside the network.

Read more

What is Technical Debt?

Technical Debt is a concept that we've heard a lot about. It conceptualizes the trade-off between the short-term benefit of rapid delivery versus long-term value. Once a company makes the trade-off for rapid delivery without fully weighing the longer-term implications, they create a level of technical debt that will need to be serviced. Much like…
Read more

RED HAT PURCHASE OF COREOS – BIG DEAL OR JUST ANOTHER DAY?

Several of our clients run Red Hat Linux Operating Systems. So, when reading this headline about a cloud security company which was just purchased by Red Hat for a cool $250 million, I thought I’d report on why this is kind of a big deal. If you were just about to stop reading, allow me…
Read more