Member Spotlight: Chad Whitman

This month’s member spotlight is Chad Whitman, Vice President, Security Engineering at Signet Jewelers. Chad had an interest in computers from a young age but was also interested in business. This dual combination led him to Purdue University’s computer technology program, which offered a blend of computer science, technology, and business courses. After Chad earned…

Read More

Building an Effective Hybrid Cloud Strategy

You want to take advantage of the benefits of a public cloud environment, including cost savings and increased flexibility, but you’re not quite ready to relinquish complete control of your most sensitive data. A hybrid cloud strategy is the solution for organizations that want the best of both worlds. A hybrid environment allows companies to…

Read More

Apache Tomcat CVE-2022-25762 Advisory

Context On May 12, 2022, Apache released an advisory regarding a high severity vulnerability in Apache Tomcat. The vulnerability, designated CVE-2022-25762, affects Tomcat versions 9.0.0.M1 to 9.0.2o and 8.5.0 to 8.5.75. Apache advises users to upgrade to 9.0.21 or later or 8.5.76 or later to mitigate the vulnerability. A May 16, 2022 advisory from CISA…

Read More

Types of Cloud Security Solutions

Moving operations to the cloud allows companies to cost-effectively do business with a global customer base and workforce. However, cloud computing comes with additional security challenges that require tools to manage effectively. These tools offer visibility across a variety of cloud environments and help automate detection of vulnerabilities and configuration/compliance risks. Here we break down…

Read More

6 Cloud Security Best Practices for Vulnerability Management

Vulnerability management is the process of identifying, investigating, correcting, and reporting on security threats in our systems and software. As organizations transition away from strictly on-premises environments in favor of public and hybrid clouds, security professionals have been forced to reevaluate traditional vulnerability management practices that are no longer sufficient in the fast-paced cloud environment….

Read More