General Data Protection Regulation (GDPR) has emerged as a global standard for the security and compliance community. The European Commission launched GDPR in 2016 to protect the personally identifiable information (PII) of European Union (EU) citizens. As most modern companies are global, protecting personally identifiable information of customers and employees has become a business priority…
For this article, we will be getting to understand what a Service Mesh is, why it is needed, and how it works in relation to Kubernetes (Orchestration framework). Definitions, terminologies will be broken down so you can better understand the aforementioned concept. Without further-ado, let’s get right into it. Photo by Clint Adair on…
An emerging role in organizational leadership is the CISO or Chief Information Security Officer. In fact, the first CISO was appointed by Citibank in 1995. However, despite the growing threat of cybersecurity attacks, many organizations do not have a CISO. This is especially true for startups that find having a CISO expensive and prohibitive. Instead,…
Infrastructure as code is the backbone of any cloud-based DevOps system or architecture. In the past, it was not uncommon for testing to be downplayed as unnecessary. Engineers may look at their work and feel there is no real need to test and push to production. However, in the long run, this is a mistake….
Every company faces a variety of unique information security challenges. To answer these challenges, ISO 27001, one of the world’s most popular information security standards, was created. Formally known as ISO/IEC 27001:2005, it is an information security management system or ISMS. It provides a framework of procedures and policies which include the legal, physical, and…
2018, Cryptoland Theme by Artureanec - Ninetheme