Time to Embrace a Security Management Plane in the Cloud

Time to Embrace a Security Management Plane in the Cloud

There’s an old saying that change is the enemy of security.  To avoid disruptive changes, many cybersecurity professionals strive for tight control of their environment and this control extends to…
Time to Embrace a Security Management Plane in the Cloud

Time to Embrace a Security Management Plane in the Cloud

There’s an old saying that change is the enemy of security.  To avoid disruptive changes, many cybersecurity professionals strive for tight control of their environment and this control extends to…
Time to Embrace a Security Management Plane in the Cloud

Time to Embrace a Security Management Plane in the Cloud

There’s an old saying that change is the enemy of security.  To avoid disruptive changes, many cybersecurity professionals strive for tight control of their environment and this control extends to…
Stay One Step Ahead of Endpoint Attacks: Worried About Apache Struts?

Stay One Step Ahead of Endpoint Attacks: Worried About Apache Struts?

Endpoint attacks can come from any direction and many sources. Just consider the reported vulnerabilities found in Apache Struts and the damage caused by WannaCry and Petya. Companies need to…

Map, Filter and Reduce – Hacker Noon

JavaScript is a language with many capabilities. There is no single concrete way to solve a problem and you have the freedom to approach it however you want. There are…