Compliance

Time for CISOs to Empower DevOps

Webinar on Thursday, March 09, 2017 at 10:00 am PST As DevOps is adopted at more organizations, it is becoming...

Start Compliant, Stay Compliant

Compliance is no longer a once & done thing. Merriam-Webster definition of “compliance” – the act...

Compliance Automation For Your Cloud

For years, security and operations pros have loathed to be involved in a compliance effort. And for good...

HHS HIPAA Guidance: Cloud Security is a Team Effort

Healthcare providers and business associates are responsible to ensure their cloud service providers are getting the job...

Need to Know How to Secure Big Data? How About 100 Ways?

While Paul Simon found that there are 50 Ways to Leave your Lover, the Cloud Security Alliance (CSA) found that there...

ISA Conference to Focus on Corporate Responsibility and Security

The Internet Security Alliance (ISA) has announced the speakers for their “Board Room to Situation Room”...

Ensuring Security in a Continuous Delivery Pipeline

In our previous post, we covered some of the major holdups when it comes to secure continuous delivery. But what does...

Rush to the Cloud Leaves Security in the Dust

While organizations are more frequently moving critical workloads to the cloud, the majority are not...

Security Pros Split Over Gov Access to Cloud Data

A new study released by the Cloud Security Alliance and security provider Bitglass revealed that security and...

New AWS Key Management Service Offers Centralized Control

AWS has launched a new import key feature which allows users to import keys from their own key management...

AWS Releases Cloud Adoption Maturity Model Guidelines

AWS has released the Cloud Adoption Maturity Model, a set of guidelines intended to assist in the development of a...

AWS Security Best Practice #0: CloudTrail and Encryption

Moving your architecture to AWS in whole or part also means that your team reaps the rewards of new changes and services...