Featured Posts

Tips & Best Practices for Configuring Squid with NTLM Authentication

Tips & Best Practices for Configuring Squid with NTLM Authentication

If you’ve ever worked in environments requiring a proxy, reverse proxy, or caching system, you’ve likely heard of Squid proxy. Squid is one of the leading open-source proxy tools with an extensive community and available plugin library. As is the case with many large,...

Anitian Named Finalist in Black Unicorn Awards for 2022

Anitian Named Finalist in Black Unicorn Awards for 2022

Company recognized as a finalist in the Baby Black Unicorn category, having potential of being valued at $1B in near future. PORTLAND, OREGON — October 27, 2022 — We are thrilled to announce that Anitian, the leading provider of cloud security and compliance...

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Company included in Hype Cycle for Agile and DevOps, Hype Cycle for I&O Automation, and Hype Cycle for Cyber Risk Management.  Link to release via GlobeNewswire.com PORTLAND, Oregon — August 24, 2022 — Anitian, the leading cloud application security and compliance...

Debunking Quantum Cloud Myths

Debunking Quantum Cloud Myths

In many ways, the human appetite for computing power is ever-growing. More computing power can be found in the cloud for our ever-growing thirst for power. But that’s still not enough. Enter the next generation of computing power — quantum computing. In this episode...

All Posts

robot-infosec

Can Security Analytics Replace Humans?

The dream of a “self-defending” network has been alive for a decade. However, recent advances in Security Analytics technologies portend the ...
Read More
2014-2015

IT Security Year in Review: Start-Stop-Stay 2015

2014 was a busy year for IT security. From Shellshock to Sony, the hacks were fast and furious. As such, this ...
Read More
PCI 3.0 Secure Authentication Requirement - Anitian

PCI 3.0 Secure Authentication Requirement

The new PCI 3.0 introduces a subtle, but important new requirement for addressing security authentication and session management for web applications ...
Read More
vulnerabilities

Vulnerability Management for the Win

How do you build a successful vulnerability management program? It involves a lot more than just scanning devices. Effective vulnerability management ...
Read More
Shellshock bug is bad

Shellshock: What You Need to Know

The Shellshock bug is a serious flaw affecting Unix, Linux and Macs. Anitian has a quick summary of the issue and ...
Read More
Why do retailers keep getting breached?

Why Do Retailers Keep Getting Breached?

Every week it seems there is a new breach. Why do retailers keep getting breached? Anitian has identified five primary reasons ...
Read More
Qualities of Successful IT Security Leaders

Qualities of Successful IT Security Leaders

What makes a successful IT security leader? Intelligence, experience, integrity? With 20 years of experience working with security people, we have ...
Read More
Surviving the Next Target Breach

Surviving the Next Target Breach

The infamous Target breach continues to provide insights. Leadership changes at Target demonstrate the new demands on IT security leadership. Leaders ...
Read More
The Fatal Flaw in IT Risk Management

The Fatal Flaw in IT Risk Management

The spate of high profile data breaches have, if nothing else, proven that organizations are managing risk poorly. Part of the ...
Read More
Security Analytics Part 3: Selecting the Right Analytics Platform

Security Analytics Part 3: Selecting the Right Analytics Platform

This is the final part of our three-part series on Security Analytics. You can view Part 1 and Part 2 here. In Part 1 and ...
Read More
Security Analytics Part 2: An Innovation Explosion

Security Analytics Part 2: An Innovation Explosion

The Security Analytics market is exploding with innovation. There are a myriad of new technologies and new ideas. In this second ...
Read More
Security Analytics Part 1: The Game is On

Security Analytics Part 1: The Game is On

Security Analytics is an emerging class of technologies that leverages big data and advanced analysis techniques to find attackers and malicious ...
Read More
Heartbleed - What You Need to Know

Heartbleed – What You Need to Know

What you need to know about Heartbleed ...
Read More
Communicating Risk to Executive Leadership - Anitian

How to Communicate Risk to Executive Leadership

In an age when cybercrime and advanced persistent threats are creating havoc, how does IT security communicate risk to executive leadership? ...
Read More
What the Target Breach Tells Us about the State of Security Programs

What the Target Breach Tells Us about the State of Security Programs

What does the Target breach tell us about the state of information security? That companies large and small are missing the ...
Read More
The Failure of the PCI-DSS?

The Failure of the PCI-DSS?

The Target breach has ignited a firestorm of debate over the efficacy of the PCI-DSS. The problem with the PCI-DSS is ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide