Featured

Evident GDPR Report Delivers Automated Approach to Compliance Monitoring and Management

Within organizations across the globe there is heightened anticipation and preparation for compliance with the General...

Emergency vs Continuous Incident Response

Would you rather be putting out fires or keeping a calm, predictable environment? Continuous monitoring of a cloud...

Incidents Happen, But Are Some of Them Avoidable?

Security and proper incident response are business-critical concerns, and managing the aftermath of a security breach or...

Audit Ready: Compliance is a Team Sport

When organization’s make the move to the cloud, compliance is typically not the first challenge considered....

Joining forces with Palo Alto Networks

When Justin Lundy and I founded Evident.io nearly five years ago, we set out to make cloud security a less painful...

A CISO’s Series of Unfortunate Events

You’ve probably seen those quaint features in business publications like, “A Day in the Life of the CFO.” They...

AWS Security Tech Tips: Programmatic Onboarding of AWS Accounts to ESP Using CloudFormation and Python

In an effort to reduce vulnerabilities and improve control over their cloud environments, an increasing number of AWS...

Evident.io Custom Signature Provides Protection in New Wave of DDoS Attacks

Only one week after a massive DDoS attack knocked GitHub offline, a new attack dubbed “Memcrash” used the...

Post-Webinar Recap: Compliance in the Cloud in 2018

Once thought of as speed bumps in the path to deployment, security and compliance are now seen as critical ingredients...

All Security is Cybersecurity

Personal data is collected and used more than ever before and in an incredibly diverse number of ways. Traditionally,...

The Evolution of DevSecOps Revisited

The inception of DevSecOps has created a whole new standard for driving innovation inside and outside organizations....

The Olympics and 4,000 Government Websites Got Owned

Two recent discoveries in the world of cybersecurity – from the Olympics and via cryptojacking – highlight...