Why Rugged DevOps is Critical to Your Survival

Why Rugged DevOps is Critical to Your Survival

We’re in a pivotal moment in technology where programmatic infrastructure, everything-as-a-service, and an explosion of internet-connected devices are combining to create amazing opportunities for businesses. The margin of differentiation between competitors is often small enough to be overcome by sufficient cash investment to accelerate one innovator over the other. However, we are now seeing perhaps the most underrated and far-reaching shift in the ability to separate winners from losers in technology – and that is the emergence of Rugged DevOps...

Read More

Cloud Security: This Isn’t Your Father’s Datacenter

Cloud Security: This Isn’t Your Father’s Datacenter

Security can be daunting in traditional datacenter environments, and adding the dynamism that cloud environments bring can be frightening for many organizations. Many organizations feel like they are faced with the choice of either taking a leap of faith and hoping for the best where security in the cloud is concerned, or falling behind their competitors in the adoption of newer and more efficient network technologies. But is this really the case?

Read More

It's Alive! Automating Security Response in the Cloud

It's Alive! Automating Security Response in the Cloud

We can no longer deploy catch-all appliances or wrap hosts in countless layers of agent-based security technology in modern cloud environments. The context and approach to security has changed drastically in this shared ecosystem. It's time for us, as an industry, to acknowledge this shift and equip ourselves for success in the new world before us through security automation...

Read More

When John McAfee Crashes Your Panel...

When John McAfee Crashes Your Panel...

RMISC serves as a powerful knowledge builder and networking opportunity for industry insiders as well for others who would like a glimpse into the fast-moving developments within the security field. This year’s event drew a record number of attendees because of its lineup of renowned panel of experts, including the high-profile keynote speaker John McAfee, who is currently running as the Libertarian Party candidate for president. McAfee surprised those in attendance at the opening plenary by crashing the opening Ambassador's Keynote Panel, and we were lucky to have captured the event in the following video...

Read More

Understanding a Rugged DevOps Approach to Security

Understanding a Rugged DevOps Approach to Security

Your operational tools deliver continuous monitoring and alerting—why doesn’t your security suite? No single path exists to a rugged DevOps approach that works for every organization, but certain key principles and techniques are used by the DevOps elite that give them distinct advantages. You can use these and revamp your organization’s processes and behaviors to gain efficiencies in your security operations. Security can no longer be thought of as being a separate step in a launch. Instead, security must be integrated into the overall processes of development and deployment...

Read More

On Programmatic Security Automation for AWS

On Programmatic Security Automation for AWS

The ability to provision and update infrastructure using APIs allows flexible and programmatic control of our security choices. These decisions will ultimately help protect intellectual data, content, applications, systems and networks ‘in’ the cloud. In this recorded webcast, John Martinez leads a deep dive discussion and provides a live demonstration of how to improve security awareness between IT, Dev, and Ops teams, as well as provide some real-world (code) examples on how to bring security into your application delivery model to reduce risks with DevOps integration and security and compliance automation...

Read More

Automating Critical AWS Security Operations

Automating Critical AWS Security Operations

You automated your deployment, elasticized your workloads, and dynamically provisioned your fleet. What do you do next? Tackle automating your security needs using the latest capabilities in the cloud! There’s no single path to building an automated and continuous security architecture that works for every organization, but certain key principles and techniques are used by the early adopter cloud elite that give them distinct advantages. It's time to re-think your organization’s processes and behaviors to demonstrate the latest efficiencies in your security operations. In this webinar, learn how Intuit implements cloud security automation...

Read More

Security Will be the Winner in the Cloud Wars

Security Will be the Winner in the Cloud Wars

Clouds tout their rapid elasticity, infinite scalability and commodity pricing when wooing developers and operations engineers. While these are some of the sexier features of today’s cloud infrastructure providers, they are not the ultimate differentiator that will win the hearts and minds of the desirable CIOs running the Fortune 5000 enterprises. What magic trait will cloud providers rely on to earn the hearts of these power players? Security – the elusive and forever-moving target for many organizations...

Read More

Inside the CIS Cloud Security Benchmark for AWS

Inside the CIS Cloud Security Benchmark for AWS

The Center for Internet Security (CIS) Benchmarks have been the defacto standard for prescriptive, industry-accepted best practices for securely configuring traditional IT components. The release of the CIS AWS Foundations Benchmark into this existing ecosystem marks one of many milestones for the maturation of the cloud and its suitability for sensitive and regulated workloads...

Read More