top of page
Search
Sec-Blogger
Dec 28, 20192 min read
What is RPA, why it matters
What is Robotic Process Automation or RPA Robotic Process Automation or RPA is one of the newest emerging forms of automation using...
28 views0 comments
Sec-Blogger
Nov 3, 20192 min read
DevSecOps, What is it?
DevSecOps is the philosophy of integrating security practices within the DevOps process. DevSecOps involves creating a 'Security as Code'...
17 views0 comments
Sec-Blogger
Oct 26, 20194 min read
How to manage non-corporate devices and prevent data exfiltration?
As mobile devices (which include laptops, Macs, iPads and Android devices) have become an increasing security risk, many companies have...
38 views0 comments
Sec-Blogger
Oct 19, 20193 min read
Two things to help protect your Workforce: Cybersecurity Training and MFA
Organizations consistently struggle with the need to maintain Cybersecurity. As posted in an article by TechRepublic: Top 5 cybersecurity...
16 views0 comments
Sec-Blogger
Oct 13, 20193 min read
What is Information Protection, and how to implement
In the 19th century, the protection of corporate assets meant locking the cash in a strongbox, putting it on the stagecoach, and arming...
11 views0 comments
Sec-Blogger
Oct 5, 20193 min read
Why Zero Trust Framework and what is it
Zero Trust Framework refers to security concepts and threat models that no longer assumes that actors, systems, or services operating...
34 views0 comments
Sec-Blogger
Sep 28, 20193 min read
4.9 million records impacted with DoorDash data breach
DoorDash data breach
20 views0 comments
Sec-Blogger
Sep 21, 20197 min read
Simple Guidance in How To Secure Your Organization Using CIS 20 Controls.
With the increasing number of data breaches every year, it becomes crucial for every organization to ensure that they have all the...
23 views0 comments
bottom of page