Architectural Patterns that Scale for the Customer
Transforming Information Security is now available on audio, through audible and coming soon to your favorite library accessible application.
TLS Version Transition Planning
Defenses evolve with time, moving from defense in depth to intrinsic. An ability to rely on services being secure is fundamental to the success of a business application.
Attachments Don’t Have to be Scary!
Reducing threats to the customer base of a SaaS application will take many forms, from secure code, supply chain assurance, to infrastructure controls. It is possible to reduce this distributed security burden for a customer base.
Phishing Tests: Are We Doing this Right?
Are we catching the phishing attacks and at the right spot?