AWS Security Best Practice #0: CloudTrail and Encryption

Moving your architecture to AWS in whole or part also means that your team reaps the rewards of new changes and services...

Continuous Delivery: What’s the Hold Up?

Software development is evolving from ambitious projects that are built over the course of months and years, and...

Why Rugged DevOps is Critical to Your Survival

We’re in a pivotal moment in technology where programmatic infrastructure, everything-as-a-service, and an explosion...

Cloud Security: This Isn’t Your Father’s Datacenter

As more and more companies are considering migrating key operations to the cloud in order to take advantage of the cost...

It’s Alive! Automating Security Response in the Cloud

The challenges facing teams responsible for creating speed and acceleration in the cloud are numerous, but the most...

On Automating Your Critical AWS Security Operations

Tackle automating your security needs using the latest capabilities in the cloud! There’s no single path to building...

When John McAfee Crashes Your Panel…

RMISC serves as a powerful knowledge builder and networking opportunity for industry insiders as well for others who...

Understanding a Rugged DevOps Approach to Security

Your operational tools deliver continuous monitoring and alerting—why doesn’t your security suite? No single path...

Chris Blask on Threat Intelligence Sharing and Cloud Security

Chris Blask, executive director of Webster University’s Cyberspace Research Institute (CRI) and chair of the...

On Programmatic Security Automation for AWS

The ability to provision and update infrastructure using APIs allows flexible and programmatic control of our security...