Federal agencies moving to the cloud have a lot to consider, but a new guide from the Chief Information Officer (CIO) Council provides some useful advice. The Application Rationalization Playbook is designed to help IT portfolio managers at federal agencies figure out which applications can be smartly migrated to the cloud. It offers detailed advice for agencies to consider… Read More
Why Cyber Security Exercises Work: Three Real World Examples
Cyber security exercises have become more prevalent in recent years. Despite this, many people are not familiar with them. In today’s blog on why cyber security exercises work, we’ll give you three real world examples you can learn from and possibly apply to your situation. Exercises are used to prepare and test a person or… Read More
Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster
We’ve just released a new feature in our ActiveEye platform that lets you visualize network activity in Amazon virtual private clouds (VPCs). In today’s blog we’ll discuss why we developed this capability. We will also explain how you can use it to detect potential security threats faster. DevOps teams are rapidly deploying applications to cloud environments. We… Read More
Breakthrough Listen Teams Up with SETI Institute to Host Out of This World Wireless Research Conference
The GNU Radio Foundation recently teamed up with the UC Berkeley SETI Research Center and the Breakthrough Listen project to sponsor the SETI RF Hackathon, an unprecedented wireless hackathon event. Encompassing the ultimate in Internet-of-Things (IoT) and signals hacking, professionals specializing in machine learning, radio frequency (RF), and cyber security converged at the Allen Telescope Array in California in May…. Read More
G Suite Security Best Practices: Proactive Steps to Stay Safe with SOC-as-a-Service
In today’s post we’ll discuss Google G Suite security best practices and some proactive steps you can take for a security tune-up. None of these recommendations are particularly hard to implement. But cloud security requires a different mindset than traditional security operations, so even savvy security teams often overlook them. We’ll also take a look… Read More
[Blog] AWS re:Inforce 2019: What to Expect
AWS re:Inforce 2019 is kicking off on June 25, and the Delta Risk team is excited to be there as an exhibitor. The two-day event will be held in at the Boston Convention and Exhibition Center. Stop by booth #417 to visit us! About AWS re:Inforce This is the first Amazon Web Services (AWS) conference dedicated to cloud… Read More