Tag: data security
TechStrong TV: strongDM Helps Kustomer Go Remote
For a procurement process to be effective, the relationship between the customer and the product team is almost as important as the functionality and features of the product itself. During this interview ...
TechStrong TV: How strongDM Helps mParticle in Secure Remote Access
In this interview for TechStrong TV, I am joined by strongDM CEO Elizabeth Zalman and mParticle CISO Dave Anderson. Dave shares with us how mParticle uses strongDM proxy services to rapidly enable ...
Fortanix Adds Platform to Manage Confidential Computing on Azure
Fortanix today announced that a software-as-a-service (SaaS) platform for managing instances of confidential computing on the Microsoft Azure cloud is now generally available. Confidential computing is an emerging approach to encrypting data ...
3 Ways DevOps Can Increase the Value of Organizational Data
There’s a reason the term “data mining” came into existence. Enterprises sit on a vast resource of information—millions of digital gems that, if fully extracted, can not only answer many of their ...
Six Steps Every Business Should Take to Protect Its Data
Data may or may not be the new oil but it is the growth engine of today’s digital age. Data about a company’s customers, products, services and sales is worth a lot ...
Achieving Full Disk Encryption and PCI Compliance
Full disk encryption (FDE) is a critical security measure in today’s modern networks. With data security being more critical than ever, many IT admins are wondering how they can enforce full disk ...
Ten Questions Data Professionals Should Be Asking When Moving to the Cloud
You have finally decided to move your data into the cloud. Whether it was the ability to leverage the power of cloud compute, the promise of cost-savings or the scalability and flexibility ...
CircleCI Achieves SOC 2 Compliance for DevOps Platform
CircleCI has achieved a SOC 2 compliance rating for the DevOps platform it makes available via a software-as-a-service (SaaS) model. Tad Whitaker, security manager at CircleCI, said CircleCI is the first provider ...
4 Challenges OEMs Face When Implementing New Technology
Like many others, the manufacturing industry is moving to a subscription-based business model. This new way of doing business is being referred to as servitization and it is forcing manufacturers to no ...
Top 5 AWS Security Mistakes: Leaky S3 Buckets
As we get ready to discuss our list of the Top 5 AWS Security Mistakes in the upcoming DevOps.com webinar, we wanted to provide a preview of the type and depth of ...
American Express Uses DevOps for Better Breach Response
It was 6 a.m. Saturday when the phone rang and awoke the American Express CIO. When the phone rings at 6 a.m., it is never good news. Never. This instance was no ...
Moving Security Beyond SSH and PKI
SSH (secure shell) is still the most common method of remotely accessing a Linux server, which makes it a common target for attackers attempting to infiltrate corporate networks. While the protocol itself ...