16 10, 2017

Tips For Using Chef Zero, Audit Mode, and Packer

By | 2017-10-16T17:40:20+00:00 October 16th, 2017|Tips & Tricks|

Image via Pixabay Recently, Joshua Kugler, a Sr. DevOps Engineer at New Context, wrote a blog post providing tips for using Chef Zero, audit mode and Packer. As leaders in DevSecOps, we believe in the importance of sharing knowledge and are passing this resource along to you. Read [...]

29 09, 2017

STIX Patterning quick reference card

By | 2017-12-11T17:44:25+00:00 September 29th, 2017|Tips & Tricks|

Indicators are probably the most frequently used object in the STIX 2 data model. At the heart of STIX Indicators is the STIX Patterning Language. STIX Patterning is a powerful tool capable of describing a wide spectrum of malicious attacker behavior in a machine-parsable format suitable for security automation. STIX [...]

10 02, 2017

How to Build DevOps Momentum

By | 2017-02-28T22:26:55+00:00 February 10th, 2017|Articles, Tips & Tricks|

For all of its challenges, 2016 was a year of inspiring innovation. SpaceX proved we can have reusable rockets by taking a page from a science fiction book and launching a rocket then landing it vertically on a moving boat. Enter a new era of space travel. Tesla sent all [...]

10 11, 2016

Three ways to get a handle on data governance in hybrid cloud environments

By | 2016-11-10T22:16:05+00:00 November 10th, 2016|Tips & Tricks, Webinar|

Experts from New Context and WANdisco joined together to explain the tools and techniques for securely managing big data in hybrid cloud environments. This webinar was held on November 3, 2016 and Attendees learned what's required for effective data governance with the highest levels of availability and performance on-premises and in the [...]

19 10, 2016

Change the Incentive Model, Change the Culture

By | 2016-10-31T22:18:54+00:00 October 19th, 2016|Articles, Blog, Tips & Tricks|

It's imperative that all security conversations start not with technical issues, but instead with an understanding of the context for those issues, and the incentive models and org culture against which they're (mis)aligned. This is why our Lean Security model is about business transformation rather than being yet another IT [...]

Load More Posts