Last time, we looked at a basic website design. Now it’s time to start digging into the details around what’s really being used behind the scenes. This time, we’ll focus on security aspects. When a user starts their browser and connects...
Cybersecurity
Enterprise Storage – Do you really get what you pay for?
In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring. This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...
Ally Financial cuts pipeline outages and eases security scanning with GitLab
Ally Financial has to meet its customer needs solely online, but using a time- consuming toolchain hurt DevOps efficiency and productivity. Adopting GitLab’s platform has changed that.At the heart of engineering excellence is DevSecOps. At the heart of DevSecOps is...
SPK Accelerates Fortune 100 MedDevice Product Sale
Our client is Fortune 100 Medical Device manufacturer. SPKAA acts as a product cybersecurity managed service provider for their hospital products which have embedded Windows or Windows OS. Fortune 100 MedDevice Problem For over 10 years, SPK has provided ongoing...