Tag: security

Security & Compliance

When It Comes to Your Brand, Security Matters

There is an old adage that the customer is always right. Unfortunately, at Flugel.it, we’ve learned this is not always the case. Recently, one of our clients came to us and said that security was unnecessary because they do not store customer or client data. For us, this was shocking to hear. Our client couldn’t…

Security & Compliance

Compliance Is Not About Paperwork

Companies often dread their compliance audits. It’s very common to see companies rush through the endeavor of documenting policies and processes. In a rush to get it done, they may get through the audit but cause new problems for themselves. For some compliance audits, it’s enough to show you have the processes in place. However,…

Security & Compliance

5 Must-Haves When Integrating DevSecOps Into Your CI/CD Pipelines

Continuous Integration and Continuous Development—or CI/CD as it is more commonly known—is one of the best ways to develop and update applications. Continuous Integration urges development teams to move through a coding philosophy and set of practices that implement small changes and frequently check-in code version control repositories. When you are ready to deliver your…

Security & Compliance

Tutorial: How to provide secure access with Hashicorp Boundary

In provisioning infrastructure for any environment, there is a need for users to securely access dynamic hosts and services – this is where the hashicorp boundary takes a great task up. Hashicorp is an open-source solution and has had several things that have made it evolve in the past years and boundary has to be…

DevOps - Security & Compliance

Why CSA CCM is a Good Starting Point in Your Compliance Journey?

It seems like every week, there is another cyberattack in the news. The tools and tactics used by cyber adversaries are more advanced than ever before. These attacks disrupt services, compromise client data, cost millions of dollars, and more. With new cyberattacks come new and more stringent regulations to protect data, users, businesses, and governments. …