Sarah Topping
Recent Posts
-
Implementing Effective Automation Solutions for PKI Security in DevOps
July 11, 2024Learn how to automate your DevOps pipelines while keeping security at the forefront of your…
-
Manage Your Environment: Choosing the Right Automated Certificate Management Solution
June 25, 2024This blogs discusses what organizations should consider when choosing the right Certificate…
-
3 Reasons to Stop Using In-House CAs
June 12, 2024Organizations run private CAs out of convenience, but are they really more secure? Here are 3…
-
Security at Scale: The Benefits of Automation for Industrial IoT
May 14, 2024Automation is emerging as a critical defence for securing large-scale IIoT use cases. Learn more…
-
Securing Industry: Navigating the Challenges of Industrial IoT Security
April 09, 2024While IIoT offers many benefits, it has also inherited many security challenges. Read to learn about…
-
Closing the Gender Gap: How the Tech Market can Benefit from Better Representation of Women
March 08, 2024For International Women’s Day, we take a look at the recent decline of women in tech and explore how…
-
Automating the Security of Your Digital Identity: A “Super” Strategy
February 01, 2024In this blog, we look at the critical importance of securing digital identities, the cost of data…
-
Bridging the DevSecOps Skill Gap with a Security Coaching Program
January 09, 2024Let’s explore the DevOps security skills gap and how a security coaching program can assist in…
-
The Shift-Left Approach: The Evolution of Security in DevOps
December 19, 2023DevOps teams are facing new challenges to securing their environments. Let’s explore how shift-left…
-
DevOps Teams Need to Reprioritize Security - Here’s How
November 22, 2023DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task.…
-
How to Get Better Business Security by Embracing Certificate Automation
November 15, 2023Let’s take a look at some of the key reasons why IT teams should implement automation within their…
-
What Can Enterprises Learn from the MOVEit Hack?
October 20, 2023The ramifications of the MOVEit hack were felt globally. Find out how your business can defend…
-
DevOps vs. DevSecOps: Understanding the Evolution and Importance of Security
October 04, 2023This blog clarifies the difference between DevOps and DevSecOps, and explores the elements and…
-
Understanding Public Key Infrastructure: Overview and Key Concepts
September 19, 2023This blog will cover the key concepts and components of PKI, as well as the benefits, applications…
-
Emerging Changes to the PKI Market that IT Teams Need to Prepare For
August 30, 2023Changes to the PKI market have created new challenges for IT teams. Here, we explore what they are…
-
ACME Protocol: Overview & Advantages
August 23, 2023Curious about the ACME protocol and its advantages? Discover how this protocol works and the…
-
World Wide Web Day: What is Digital Identity?
August 01, 2023A celebration of World Wide Web Day and why protecting digital identity is important.