Featured Posts

Tips & Best Practices for Configuring Squid with NTLM Authentication

Tips & Best Practices for Configuring Squid with NTLM Authentication

If you’ve ever worked in environments requiring a proxy, reverse proxy, or caching system, you’ve likely heard of Squid proxy. Squid is one of the leading open-source proxy tools with an extensive community and available plugin library. As is the case with many large,...

Anitian Named Finalist in Black Unicorn Awards for 2022

Anitian Named Finalist in Black Unicorn Awards for 2022

Company recognized as a finalist in the Baby Black Unicorn category, having potential of being valued at $1B in near future. PORTLAND, OREGON — October 27, 2022 — We are thrilled to announce that Anitian, the leading provider of cloud security and compliance...

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Company included in Hype Cycle for Agile and DevOps, Hype Cycle for I&O Automation, and Hype Cycle for Cyber Risk Management.  Link to release via GlobeNewswire.com PORTLAND, Oregon — August 24, 2022 — Anitian, the leading cloud application security and compliance...

Debunking Quantum Cloud Myths

Debunking Quantum Cloud Myths

In many ways, the human appetite for computing power is ever-growing. More computing power can be found in the cloud for our ever-growing thirst for power. But that’s still not enough. Enter the next generation of computing power — quantum computing. In this episode...

All Posts

Equifax Breach - Outrage Fatigue

Equifax Breach – Outrage Fatigue

The Equifax breach has us all outraged…and we are not going to do anything to change that ...
Read More
NIST 800-53 r4 TOC

What’s New in NIST 800-53 R5

The new NIST 900-53 Revision 5 is out, and we look at the changes ...
Read More
ISO 27001 - Part 3 - The Audit

ISO 27001 – Part 3 – The Audit

ISO 27001 audits are not like other kinds of security assessments ...
Read More
ISO 27001 - Part Two - Building an ISMS

ISO 27001 – Part Two – Building an ISMS

Learn the six steps to building an ISO 27001 ISMS ...
Read More
ISO 27001 Compliance - Part 1 - The Fundamentals

ISO 27001 Compliance – Part 1 – The Fundamentals

ISO 27001 compliance is rapidly become a model standard for organizations wishing to demonstrate security diligence in a global market ...
Read More
Webinar Video: The Art of Writing for Cybersecurity - Anitian

Webinar Video: The Art of Writing for Cybersecurity

In this webinar, we share our strategies to dramatically improve the readability (and therefore the acceptance) of your security policies. We ...
Read More
Webinar Video: Future SOC: Security Operations in 2020 - Anitian

Webinar Video: Future SOC: Security Operations in 2020

Indiana Jones has nothing on a CISO. The adventure to build a Security Operations Center (SOC) is not for the faint ...
Read More
The Road to SOC2

The Road to SOC2

SOC2 compliance is a must-have for SaaS companies. Anitian’s VisionPath compliance team looks at your road to SOC2 compliance ...
Read More
Hardening iOS - Anitian

Hardening iOS

Hardening the Apple iPhone and iPad is easier thanks to a new benchmark from the Center on Internet Security ...
Read More
Avaya Hack

Avaya Hack

Discovery of Avaya servers in an network is consistently as target rich environment for hacking ...
Read More
Red Team Penetration Testing - Fallout (Part 3 of 3) - Anitian

Red Team Penetration Testing – Fallout (Part 3 of 3)

What can we learn from our recent red team penetration testing results about the state of information security in 2017 ...
Read More
Red Team Penetration Testing – Going All the Way (Part 2 of 3)

Red Team Penetration Testing – Going All the Way (Part 2 of 3)

The further chronicles of Anitian’s red team testing. Armed with a single stolen user account, we completely compromise a corporate network ...
Read More
Red Team Penetration Testing - Anything Goes (Part 1 of 3) - Anitian

Red Team Penetration Testing – Anything Goes (Part 1 of 3)

Chronicle of a recent red team penetration test from Anitian’s Ring.Zer0 team that shows how a dedicated attacker can bypass even ...
Read More
Goodbye Yellow Brick VAR - Anitian

Goodbye Yellow Brick VAR

Oh we’ve finally found where our future lies, beyond the yellow brick VAR ...
Read More
I Am Not Reading Your Security Policy

I Am Not Reading Your Security Policy

Wondering why people will not read your security policies? Maybe because they are unreadable. Its time to modernize the information security ...
Read More
The Gilfoyle Problem

The Gilfoyle Problem

We are going on a Vision Quest to explore our Gilfoyle Problem in IT and cybersecurity ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide