nVisium Bluescape Case Study

nVisium Bluescape Case Study

When scaling operations and building new infrastructures, it is vital that organizations test and evaluate how secure applications are from the ground up before they are implemented, as the security of a particular architecture or infrastructure should never be an...
Compliance Isn’t A Dirty Word

Compliance Isn’t A Dirty Word

If you are old enough to remember George Carlin’s comedy sketch on the 7 words you can’t say on TV, then you are probably scratching your head at how far we have come on what is considered a dirty word and what is now commonly accepted. If you are a CISO then there...
Securing The DevSecOps Pipeline

Securing The DevSecOps Pipeline

It doesn’t take a rocket scientist to figure out that implementing best practices for security throughout the entire lifecycle of a software development project will ensure that risk mitigation is at its highest once deployed; but what are the best tools , tips and...
ROI: Tips For Justifying An Application Risk Assessment

ROI: Tips For Justifying An Application Risk Assessment

Attempting to justify security expenditures is sometimes an easy internal proposition and can sometimes be a massive challenge as many organizations don’t truly understand the far-ranging impact of a single breach. Justifying return on investments, especially for...