Skip to main content

Blog Posts: DPS

Defensive Weapons in Containerized Environments December 2022 by Iain Beveridge

The oldest known example of hardened and tempered metal was a pick-axe found in Galilee…

Retaining control within the Enterprise while still deliveri... December 2022 by Kevin McKeogh

Is there a mandate within your organization to adopt the cloud and migrate some, or…

Considerations for an Effective Database Security Strategy December 2022 by Andrew Tweedie

Have you ever hidden a key to your front door under a rock and simply…

Preventing Hyperjacking in a virtual environment November 2022 by Iain Beveridge & Dave Stevens &

In the rapidly evolving world of information security, attack vectors, and cyberattacks, there is a…

Retaining Customer Control in a Multi-Cloud Environment October 2022 by Iain Beveridge

In a recent blog I covered the Cloud Security Alliance (CSA) publication: Top Threats to Cloud Computing…

Why the quantum threat isn’t the next Y2K October 2022 by Samantha Mabey

There’s a new term making the rounds: Y2Q. As you might have already guessed, it’s…

The NSA releases a post-quantum preparedness timeline… tha... October 2022 by Samantha Mabey

Just last month, the National Security Agency (NSA) announced the release of the “Commercial National…

From Dynamite to Quantum Entanglement October 2022 by Greg Wetmore

When you think of “entanglement” what comes to mind? Knotty problems? Sticky situations? If you’re…

NSA announces new Post-Quantum resistant algorithm Suite 2.0... October 2022 by Iain Beveridge

Recently the National Security Agency (NSA) provided an update on its security posture with regards…

Like a zero-day attack but 30 years before it happens September 2022 by Iain Beveridge

The title of the blog are not my words but those of Canadian mathematician and…

  • Sort by

  • Topic