On this episode, the ContinuousX team again has a fascinating discussion with Peter Chestna, CISO of North America at Checkmarx, on how security layers in microservices differs from the old monolith that you are breaking down, and how to establish each microservice as its own security island.
Container protection is the ability to stop an attack before it can cause damage to its intended target—no matter what the attack vector. Comprehensive container protection is critical to deploying a technology stack that aligns with the Office of Management and Budget’s (OMB) strategy to move the US Government toward a “zero trust” approach to cybersecurity.
This Blueprint is designed to provide a deep dive into the State of Pennsylvania’s IT trends and tech domain-specific drivers aimed at helping you win business.
This Blueprint is designed to provide a deep dive into the State of Maryland’s IT trends and tech domain-specific drivers aimed at helping you win business.
IBM and Amazon Web Services (AWS) have assembled an ecosystem of highly experienced professionals dedicated to deploying customer solutions on AWS. Download the whitepaper to learn more and find out why IBM is the ideal partner for customers' cloud transformation journey on AWS.
General counsel and legal departments often help guide educational institutions through cybersecurity incidents, and all evidence shows that those threats are increasing.
The rise in a remote workforce and use of cloud-enabled business applications equates to the browser essentially becoming our office, providing access to all necessary tools, data, and communications. Threat actors understand this paradigm shift and are now utilizing Highly Evasive Adaptive Threats (HEAT) to initiate ransomware, extortion ware, and other endpoint intrusions.
Find out how Menlo Security can help prevent your organization from cyber attacks in this one pager.
In this federally focused primer, we’ll dive into TD SYNNEX Public Sector’s data framework, as well as a landscape review of the latest legislation surrounding big data guidance and regulation requirements for civilian and defense agencies. Finally, we’ll wrap up with a sample of data driven opportunities vendors will want to watch in the coming years.
On our latest ContinuousX podcast, Checkmarx’s CISO Peter Chestna explore everything (and I mean everything!) as code; infrastructure, security, pets vs cattle, automated Continuous Deployment, shift-left controls, The Phoenix Project’s Brent vs a Mack Truck, the continuous knowledge gap unsolved by Hello World, Victorian Era craftsmanship vs Industrial Revolution mass production, the 80/20 solution and detecting drift.
Innovation and adaptability are critical for success in today’s digital world.
Building on the May 2021 cybersecurity executive order, the August 2021 Office of Management and Budget (OMB) memo M-21-31, “Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity Incidents,” requires Federal agencies to implement a four-tier system for event logging (EL) as part of the move to zero trust.
This datasheet covers how Axonius helps agencies comply with Section 8 of Executive Order 14028. It reviews what the challenges are, what agencies must do, how M-21-31 can be achieved, and why Axonius for m-21-31.
On our latest ContinuousX podcast, Checkmarx’s CISO Peter Chestna discusses the challenges of Continuous ATO in the public sector. Join him and our hosts Rick Stewart and Michael Fitzurka as they explore utilizing strong guardrails within automated CI/CD pipelines to address ATO, Separation of Duties and SBOM management.
Orock provides data storage for NIH to accelerate cure-related research.