Are Enterprises Thinking About Security All Wrong?

Organizations often regard cybersecurity as a series of barricades protecting the inner workings of the data center from attacks. These barricades can be hardware or software and take actions such as blocking ports, watching traffic patterns for possible intrusions, encrypting communications and so forth. In practice, these measures are only part of a comprehensive cybersecurity strategy, and by themselves will do little to bolster the overall resilience of an organization. But thoroughly tested and streamlined procedures within IT operations can prevent the most common attack point on the internet: misconfigurations.

Read More

Twitter Could Avoid Outages With Executable Documentation

Whether a user or not, we all are familiar with the popular microblogging service, Twitter. With over 200 million users, it’s no easy task to maintain their infrastructure. It has been plagued with several outages in recent times including one this week. A product with a die hard user base can face severe backlash for even the slightest of outages.

Read More

Top 5 Configuration Errors in the Cloud for 2012

Misconfigurations are a major cause of problems in all areas of IT, from Development through to Operations. They can be responsible for data loss, security breaches, even total service outages.

Read More

What is Cyber Resilience?

Cyber resilience is a fundamental change in understanding and accepting the true relationship between technology and risk. IT risk (or cyber risk, if you prefer) is actually business risk, and always has been. And the cybersecurity industry, for what it's worth, has generally avoided this concept because it goes against the narrative that their respective offerings—whether it's a firewall, IDS, monitoring tool, or otherwise—would be the one-size-fits-all silver bullet that can keep businesses safe. But reality tells a different story.

Read More