New from Evident.io
The Cheeseburger Principle of Cloud Compliance
Our CEO, Tim Prendergast, dropped some deep philosophical knowledge that came in the form of something called the Cheeseburger Principle, and as you might have guessed, it relates to cloud compliance. Grab some ketchup and read on.
From Obstacle to Advantage: Compliance in the Cloud 2018
Learn more about the steps that you, your CSP, and your SecOps and DevOps teams will need to take when it comes to Compliance in the cloud in 2018 in our upcoming January 25th, 2018 webinar.
Get Cloud Fit: 11 AWS Cloud Security Best Practices
Get pumped up to get CloudFit with this informative infographic that walks you through the 11 best practices to help you secure and control your cloud environment. Just like your own efforts to be fit require continuous attention, so does the effort required to prevent hacks and breaches.
The Six Essentials For DevOps Team Excellence
Innovative enterprises are using the cloud to benefit from agility, ease-of-use, and scalability advantages. In this ebook, learn how these teams are using DevOps to be more responsive and deliver innovation.
News and Perspectives on Cloud Security
Cloud Workloads at Risk from Security, Management & Compliance Failures
New research from WinMagic has revealed that security, management and compliance challenges are affecting the benefits businesses get from using the cloud within their infrastructures.
As Cloud Looms, Security Tops IT Resilience Investment
When it comes to investments in IT resilience, cybersecurity initiatives top the to-do list for most IT departments and is the top initiative that most companies will pursue in the next 24 months, according to a report from Syncsort.
North Carolina Introduces Data Breach Legislation
A new piece of legislation in North Carolina, the “Act to Strengthen Identity Theft Protections”, aims to update the state’s definition of a data breach, expanding the scope to include ransomware attacks.
The Hidden Toll of Fixing Meltdown and Spectre
There’s more to fixing major vulnerabilities than just distributing a patch. This piece from Wired explains all the gory details of the inner workings of dealing with these two latest breaches.