Compliance

binary map

5 things you need to know about the proposed EU General Data Protection Regulation

European regulators are serious about data protection reform. They’re inches away from finalising the General Data Protection Regulation (GDPR), which is a rewrite of the existing rules of the road for data protection and privacy spelled out in their legacy […]

5 things you need to know about the proposed EU General Data Protection Regulation Read More »

digital woman

Experts weigh in on ISACA ‘DevOps Practitioner Considerations’

Checklists alone don’t help organizations function better or be more secure. For businesses interested in actually functioning better or being more secure, though, a set of guidelines provides a framework–a solid foundation that lets them track things and make sure

Experts weigh in on ISACA ‘DevOps Practitioner Considerations’ Read More »

Report: Cybersecurity knowledge gap between board and IT is a problem

IT security professionals–the CIOs, CTOs, and CISOs of the world–are generally responsible for implementing and managing security in the trenches. In many organizations, though, its the board that oversees security governance and makes decisions regarding security purchases and policies. A

Report: Cybersecurity knowledge gap between board and IT is a problem Read More »

Hyper-V Containers

Microsoft Hyper-V Containers add a layer of security to containerization

Container technologies like Docker are taking the IT world by storm. Containers are an effective and efficient way to develop and deploy apps. For companies that value or require security, however, traditional container platforms are inadequate. Microsoft developed Hyper-V Containers

Microsoft Hyper-V Containers add a layer of security to containerization Read More »

Scroll to Top