Continuous Integration and Continuous Development—or CI/CD as it is more commonly known—is one of the best ways to develop and update applications. Continuous Integration urges development teams to move through a coding philosophy and set of practices that implement small changes and frequently check-in code version control repositories. When you are ready to deliver your…
In provisioning infrastructure for any environment, there is a need for users to securely access dynamic hosts and services – this is where the hashicorp boundary takes a great task up. Hashicorp is an open-source solution and has had several things that have made it evolve in the past years and boundary has to be…
It seems like every week, there is another cyberattack in the news. The tools and tactics used by cyber adversaries are more advanced than ever before. These attacks disrupt services, compromise client data, cost millions of dollars, and more. With new cyberattacks come new and more stringent regulations to protect data, users, businesses, and governments. …
Did you know that Security and Compliance are two very different things? Before explaining the main differences, it is important to be focused on basic concepts: Compliance: Mainly focused on alignment with regulations, standards and/or best practices. For example, let’s think about companies on the Stock Market that are required to be in compliance with…
2018, Cryptoland Theme by Artureanec - Ninetheme