An Inside View into a Supply Chain Attack
In early 2019, it was reported that one of the largest information technology outsourcing and consulting firms had suffered a major data breach.
Endpoint Detection and Response
EDR solutions come in a variety of implementations and can vary significantly in scope and efficacy. Choosing the best solution can be challenging.
Security Orchestration and Automation Playbook
This playbook highlights some of the most common use cases for security orchestration and automation, as well as useful tips on how to get started.
Leading Your Team to DevOps Maturity
Rob Zuber, CircleCI CTO, brings an inspiring and practical guide to moving your team further up the DevOps maturity ladder, regardless of where you are now.