Cybersecurity
Security over the total application lifecycle: Understanding assets, threat models
"In most cases, it’s easier and more efficient to have a pipeline run when a change is detected in a key component"
Cybersecurity
"In most cases, it’s easier and more efficient to have a pipeline run when a change is detected in a key component"
Cybersecurity
It took TWO YEARS for all agencies to meet an earlier 45 day deadline
Cybersecurity
Patch, patch, patch
Cybersecurity
"Building the muscle" and software-defined micro-segmentation
Cybersecurity
"Too often security teams makesa lot of noise when things are wrong, but disappear when things are going well"
Cybersecurity
"There is real danger of over-militarising the cyber domain..."
Cybersecurity
"We are not 100% convinced that being first to market and having great sales and support is enough..."
Cybersecurity
Is Active Directory the problem here?
Cybersecurity
"Our clients have experienced... breaches of systems and cloud-based services"
Cybersecurity
"The CI/CD pipeline is the ultimate delivery vehicle..."
Cybersecurity
Hackers encrypting sh*t systems; literally.
Cybersecurity
Microsoft shrugs off attack