Get My Score

Blog

 No security means you will likely have no business in the cloud

For an engineer such as myself, who is involved in cloud computing, and generally excited about being in the middle of nothing short of a “computing revolution”, attending AWS re:invent 2016 is akin to making an annual pilgrimage. The experience of being among the fellow travelers at the expo hall, listening to keynote addresses that set the tone for next phase of cloud computing, and walking by the myriad of booths with solutions that vie with each other pushing the envelope, was nothing short of transformational.

0
0
0
s2sdefault

THE ISO/IEC 27002:2013 CHALLENGE

ISO/IEC 27002:2013 Information technology -- Security techniques -- Code of practice for information security controls

You might think that implementing an ISO 27002 ISMS program is fairly straight forward, and even an easy sell to the business and supporting enterprise.  After all, Information Security is defined by the the C-I-A triad, the most well-known model for security policy development.  Who can resist a tried and true C-I-A triad?

0
0
0
s2sdefault

Cloud computing, on its own is a benign concept, identified as having these five attributes:

0
0
0
s2sdefault

Docker is a framework making it easy to create, deploy, run, and orchestrate applications by using containers. Basically, a container is another form of virtualization. A minimal image contains functionality of an operating system, but depends on the host for all of its system calls. For a complete overview tutorial on Docker and for Docker security, we recommended more reading from the Docker Inc. site.

0
0
0
s2sdefault
“If your company currently uses third party vendors to provide services that include the collection, processing and/or retention of sensitive information, you should consider inquiring into whether they have successfully completed a SOC 2 Type 2 audit, as it helps to ensure a higher standard for protecting your data.” Jeanne Madden, Vice President Operations, ADP Tax Credit Services

0
0
0
s2sdefault

If you are an enterprise IT infrastructure administrator and you don't currently live in a cave, you've been hearing a lot about “Docker” and the term "containers".

0
0
0
s2sdefault

© 2018 Cavirin Systems, Inc. All rights reserved.