Information security practice has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we think about securing our infrastructure and applications.
Sourcing Security Superheroes: Part II: How Policy Can Enhance, Rather Than Hinder, Breach Detection
In theory, security policies put standards in place to protect organizations, stakeholders, and users. But in practice, security policy often becomes a distraction, forcing organizations to focus on satisfying the demands of a governing body or an auditor, rather than addressing real threats.
This is the first article of a two article series in which we try to work from an abstract level of IoT reference architectures towards a concrete architecture and implementation for actual use cases. 8
Boyan Mihaylov covers his experience when working with both traditional waterfall software architectures and agile ones. 11
This article focuses on why DevOps is needed, what concepts and values should support it, as well as how we implemented it at Seamless, what results we obtained and the challenges we faced.
Enterprise security teams are charged with maintaining the “perfect” set of security policies. In their pursuit of the perfect security policy, they are often the department of slow. 1
The authors discuss an approach that uses TCP SYN packets for OS ﬁngerprinting to detect the presence of unauthorized OSs in an enterprise. 3
This article discusses the key questions to be contemplated by your enterprise in determining whether Git is right for you and what you need to consider in moving to Git.
Tathagat Varma, shares his experience of working as an individual contributor at a deeper leadership level. This post explains how to lead without authority. 2
The Design and Implementation of the FreeBSD Operating System is a long awaited update to a successful and authorative guide to the FreeBSD kernel that covers all major new features up to FreeBSD 11.
In this article, authors discuss ad hoc anonymous & secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.