DevOps Market: Novel Approaches & Products

Author(s):

Pratik Gundawar, ,

DevOps Market, Concept Of Devops, Illustrates Software Delivery Automation Through Collaboration And Communication, Infinity Symbol

How to Bring a Boom to the DevOps Market With competitive pressure increasing drastically and the digital economy progressing considerably, enterprises need to figure out new ways to plan, develop, and add value. Therefore, to adapt to digital transformation efficiently, DevOps has become a necessity to eliminate technical and cultural constraints for offering value rapidly. … Read more

The Top 5 Cybersecurity Myths That Need to Die

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity Myths Man in Suit Looking at a White Wall With Two Direction Arrows Pointed To Fact or Myths

Cybersecurity myths are pervasive ideas people have about cybersecurity that weaken your cybersecurity posture. These myths often are defense mechanisms, rationalizations for apathy and inaction. It is important to dispel these myths. Otherwise, you could be opening yourself, or your business, to vulnerability. Cybersecurity Myth #1: Cybersecurity is the IT Guy’s Problem If you work … Read more

Why are SMB owners unprepared to deal with cybercrime?

Author(s):

Maureen Brogie, Senior Advisor, InsuranceBee

SMB Owners throwing up hands in frustration at computer

Research shows that cyber-attacks on small businesses are on the rise. However, SMB owners are exposing themselves to significant financial risk by not implementing adequate steps to recover from a cyber-attack. InsuranceBee recently conducted a survey of over 1,300 SMBs, revealing that 54% do not have a plan in place to deal with a cyber-attack. … Read more

From the Spring 2016 Issue

What’s Next for Cybersecurity in Maryland?

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

When asked about his recent transition from Garrison Commander at Fort George G. Meade to Director of Cyber Development in the Maryland Department of Commerce (previously the Maryland Department of Business and Economic Development), Ken McCreedy laughed and said, “It’s been a whirlwind.” The retired U.S. Army colonel has taken on this prestigious role in … Read more

From the Spring 2016 Issue

The Changing Tide of Enterprise IT

Author(s):

Tom Caldwell, Co-Founder/EVP, CyberFlow Analytics

The expansion of network-connected devices that has been dubbed the Internet of Things (IoT) has also brought about a sea change in enterprise information technology (IT). While this change has been occurring over several years, it is now accelerating, drawing increased attention and necessitating adjustment. Traditional enterprise IT shops are often separated into silos containing … Read more

From the Spring 2016 Issue

Reinforcing the Links to Strengthen the Chain: Vendor Risk Management

Author(s):

Jennifer Donaldson, CRISC, Senior Vendor Risk Analyst, FedEx Services

Kimberly Lofties, CRISC, Senior Vendor Risk Analyst, FedEx Services

Housekeeping, landscaping, tax preparation, and automobile services are all best left to the experts. Private individuals outsource because it saves time and money, and businesses do the same. The top reasons companies outsource are to lower operational and labor cost, and to focus on their core business functions.1 Outsourcing relieves the pressures of large monetary … Read more

From the Spring 2016 Issue

Maryland Cybersecurity: We Are Many, We Are One

Author(s):

Gina Palladino, Owner, Silver Tree Consulting, Inc.

Stacey Smith, Executive Director, Cybersecurity Association of Maryland, Inc.

“Maryland has effectively leveraged its existing assets, proximity to the federal government, and strong leadership both at the gubernatorial and congressional delegation level to brand itself as the ‘cybersecurity epicenter’ of the country.” A bit of cybersecurity history In 1903, magician and inventor Nevil Maskelyne disrupted John Ambrose Fleming’s public demonstration of Guglielmo Marconi’s supposedly … Read more

From the Winter 2016 Issue

The New Chief Information and Security Officer: A Disruptive Agent of Translation

Author(s):

Siobhan MacDermott, Principal, Ernst & Young LLP

Globalization and the Internet of Things have raised the business world’s connectedness to unprecedented levels. As a result of this always-on environment, consumers are demanding immediate and secure access to all kinds of information across multiple platforms and devices. Take that environment and the rapid digitization of information and we have a new world of … Read more