Blog

Zero Trust Approach to Security

Organizations must discard the old model of ‘trust but verify’ which relied on well-defined boundaries. The new model of “Zero Trust” mandates a ‘never trust, always verify, enforce least privilege” approach from inside and outside the network.

Read more

What is Technical Debt?

Technical Debt is a concept that we've heard a lot about. It conceptualizes the trade-off between the short-term benefit of rapid delivery versus long-term value. Once a company makes the trade-off for rapid delivery without fully weighing the longer-term implications, they create a level of technical debt that will need to be serviced. Much like…
Read more

RED HAT PURCHASE OF COREOS – BIG DEAL OR JUST ANOTHER DAY?

Several of our clients run Red Hat Linux Operating Systems. So, when reading this headline about a cloud security company which was just purchased by Red Hat for a cool $250 million, I thought I’d report on why this is kind of a big deal. If you were just about to stop reading, allow me…
Read more

SOCIAL MEDIA VULNERABILITY

As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have…
Read more

EDUCATE EMPLOYEES ON AVOIDING SECURITY BREACHES

It’s a truism that educating employees is one of the most important steps to preventing security breaches in the workplace. In fact, one survey found that two thirds of the professionals charged with data protection and privacy training point to employees as the largest source of failure in corporate IT security measures. Surprisingly, though, businesses are not…
Read more