21 Results for:SOP
- Sort by:
Changing the culture of information sharing for cybersecurity
21 Oct 2020Dan Young explains why it's time for the cybersecurity industry to come together regarding information sharing and how insurance providers, regulators and others could assist. Read More
To secure DevOps, break culture and tooling barriers
07 Oct 2019The importance of secure DevOps initiatives can't be denied, but building security into DevOps isn't easy. Explore what needs to change and how those changes can be achieved. Read More
Win10 1809 Publicly Available
19 Dec 2018With Win10 1809 publicly available through Windows Update, admins should formulate a workable recovery strategy in case one or more such upgrades go sideways. Here's how. Read More
How the Docker REST API can be turned against enterprises
05 Oct 2017Security researchers discovered how threat actors can use the Docker REST API for remote code execution attacks. Michael Cobb explains this threat to Docker containers. Read More
Why craft beer makers are tapping into ERP for craft brewery software
06 Mar 2018As with other process manufacturers, ERP software can help craft breweries maintain quality, while better managing growth and unexpected success. Here's a look. Read More
System administrator guide to the contra-admin approach
22 Jun 2012A system administrator can benefit by adopting a contrarian approach to system administration. Learn how to use contra-admin effectively as a sysadmin. Read More
How to preserve forensic evidence in the golden hour after a breach
12 Dec 2012There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Read More
The 3 pillars of a DevSecOps model
07 Oct 2019In this excerpt from Chapter 1 of Securing DevOps: Security in the Cloud, author Julien Vehent describes three principles critical to the DevSecOps model. Read More
Post Office Horizon inquiry set to be given statutory status with wider powers
18 May 2021The government inquiry into the Post Office Horizon scandal is set to be made statutory with the power to call witnesses under oath and compel provision of evidence Read More
Are FedRAMP security controls enough?
03 Jun 2013Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far. Read More