Articles

  • Aug 14, 2024 | securityboulevard.com | Liam Crilly

  • Aug 14, 2024 | securityboulevard.com | Liam Crilly

  • Aug 14, 2024 | securityboulevard.com | Liam Crilly

    More and more enterprises today are turning to GitOps as a way to better control and audit technology. Initially focused on code, GitOps increasingly focuses on configurations and IT management as more security and network capabilities are shifted to application teams. Because it is based on Git versioning and enables close monitoring of changes to configurations, GitOps should make it easier to solve configuration error issues that are the root cause of so many security problems.

  • Jul 24, 2024 | thenewstack.io | Liam Crilly |Siddarth Jain |Patrick McFadin |Alex Williams

    In the old world of application security and access control, least privilege was a lovely ideal but nearly unworkable in practice. Every company of a certain size instituted role-based access controls (RBACs). As soon as a firm is large enough to talk about any major form of compliance (like SOC2) or to build out considerable technology infrastructure, a lockdown of systems would ensue.

  • Jul 2, 2024 | thenewstack.io | Liam Crilly |Richard MacManus |Usama Jamil |Steven Vaughan-Nichols

    In the most famous line from the classic mockumentary “Spinal Tap,” Nigel Tufnel, the lead guitarist, points to an amplifier and notes the additional number on the dial, saying that it “goes up to 11.”Alas, “this one goes to eight” does not have quite the same ring, but it might be time to use this phrase to describe a new layer of the traditional networking stack — the semantic layer. The addition of Layer 8 is driven by AI applications and their new exigencies.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →