Adobe Works with the Prelude Institute to Help Address the Cybersecurity Talent Gap

Open Source Common Controls Framework (CCF) v3.0 Now Available

Introducing Tripod: an Open Source Machine Learning Tool

DYK?

Connect with us

Security Automation Part III: The Adobe Security Automation Framework

In previous blogs [1],[2], we discussed alternatives for creating a large-scale automation framework if you don’t have the resources for a multi-month development project.

Centralized Security Governance Practices To Help Drive Better Compliance

Adobe CCF has helped us achieve several security compliance goals and meet regulatory requirements across various products and solutions. In addition, we have also achieved SOX 404 compliance across our financial functions to further support our governance efforts.

Security Automation Part II: Defining Requirements

Every security engineer wants to build the big security automation framework for the challenge of designing something with complexity. Building those big projects have their set of challenges.

Security Automation for PCI Certification of the Adobe Shared Cloud

Software engineering is a unique and exciting profession. Engineers must employ continuous learning habits in order to keep up with constantly morphing software ecosystem.

IT Asset Management: A Key in a Consistent Security Program

IT Asset Management (ITAM) is the complete and accurate inventory, ownership and governance of IT assets. ITAM is an essential and often required stipulation of an organization’s ability to implement baseline security practices and become compliant with rigorous industry standards.

Do You Know How to Recognize Phishing?

By now, most of us know that the email from the Nigerian prince offering us large sums of money in return for our help to get the money out of Nigeria is a scam. We also recognize that the same goes for the email from our bank that is laden with spelling errors.

Security Automation Part I: Defining Goals

This is the first of a multi-part series on security automation. This blog will focus on high-level design considerations. The next blog will focus on technical design considerations for building security automation.

Security Considerations for Container Orchestration

Click here to read this article.

Tips for Sandboxing Docker Containers

Click here to read this article.

Adobe’s CCF Helps Acquisitions Meet Security Compliance Requirements

Click here to read this article.

Identity and Access Management in the Enterprise Environment

Click here to read this article.

Preparing for Content Security Policies

Click here to read this article.

Striving for a Security Culture

Click here to read this article.

Look Back on 10 Years of Incident Response at Adobe @ FIRST 2016

Click here to read this article.