21 Results for:SOP

  • Sort by: 

Changing the culture of information sharing for cybersecurity

21 Oct 2020

Dan Young explains why it's time for the cybersecurity industry to come together regarding information sharing and how insurance providers, regulators and others could assist. Read More

To secure DevOps, break culture and tooling barriers

By Sharon Shea 07 Oct 2019

The importance of secure DevOps initiatives can't be denied, but building security into DevOps isn't easy. Explore what needs to change and how those changes can be achieved. Read More

Win10 1809 Publicly Available

By Ed Tittel 19 Dec 2018

With Win10 1809 publicly available through Windows Update, admins should formulate a workable recovery strategy in case one or more such upgrades go sideways. Here's how. Read More

How the Docker REST API can be turned against enterprises

By Michael Cobb 05 Oct 2017

Security researchers discovered how threat actors can use the Docker REST API for remote code execution attacks. Michael Cobb explains this threat to Docker containers. Read More

Why craft beer makers are tapping into ERP for craft brewery software

By Pam Baker 06 Mar 2018

As with other process manufacturers, ERP software can help craft breweries maintain quality, while better managing growth and unexpected success. Here's a look. Read More

System administrator guide to the contra-admin approach

22 Jun 2012

A system administrator can benefit by adopting a contrarian approach to system administration. Learn how to use contra-admin effectively as a sysadmin. Read More

How to preserve forensic evidence in the golden hour after a breach

By Martin Roots 12 Dec 2012

There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Read More

The 3 pillars of a DevSecOps model

By Sharon Shea, Manning Publications Co. 07 Oct 2019

In this excerpt from Chapter 1 of Securing DevOps: Security in the Cloud, author Julien Vehent describes three principles critical to the DevSecOps model. Read More

Post Office Horizon inquiry set to be given statutory status with wider powers

By Karl Flinders 18 May 2021

The government inquiry into the Post Office Horizon scandal is set to be made statutory with the power to call witnesses under oath and compel provision of evidence Read More

Are FedRAMP security controls enough?

By Joseph Granneman 03 Jun 2013

Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far. Read More