Chris Wysopal

Assessment Guidelines to Securing an Enterprise

Secure Infrastructure:Employ Perimeter Security Do not allow any external Internet connections to terminate on any internal machines. DMZs must be used. This also goes for connections from partner networks. All Internet...

Latest Posts

Best Practices for Multicloud (that Cloud Providers Prefer You Not Know)

Multicloud is one of those topics that most cloud providers would rather not discuss. Why? Well, you’re admitting that their cloud is not the...

An Overlooked Cybersecurity Threat: 5G

5G is taking the world by storm for its notable speed and bandwidth strength. It supersedes 3G, which gained popularity in the early 2000s...

The Successful CISO: How to Build Stakeholder Trust

If we track the recent progress of the Chief Information Security Officer (CISO), there’s good reason to wonder if they are headed toward the...

Atos OneCloud’s Michael Liebow on Cloud Computing Challenges and Solutions

I spoke with Michael Liebow, Global Head of Atos OneCloud, about how legacy architecture plays such a core role even in today’s newest cloud...

Why NPM Tools Need to Work Across On-Prem, Cloud, and Hybrid Environments

The networking landscape has shifted dramatically over the past two years as remote work, cloud migration, and container-based architectures have augmented network infrastructure. This...