Search results: infrastructure-as-code

AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

|
As teams leverage infrastructure-as-code (IaC) at scale on AWS, ops and platform teams are tasked with implementing provisioning standards to prevent security breaches, non-compliance or provisioning practices that drive cloud waste. With ...
IAC Security | Synopsys

Improving cloud security posture with infrastructure-as-code

With ever-increasing application architecture complexity, infrastructure-as-code is your key to boosting your cloud security posture.  ...
Why Infrastructure-as-Code Scanning Matters for Kubernetes Configuration

Why Infrastructure-as-Code Scanning Matters for Kubernetes Configuration

| | security
Infrastructure as code (IaC) is the ability to provision and manage infrastructure using a configuration language. It offers the repeatability, transparency, and testing of modern software development to the management of infrastructure ...
Keynote: 25 Years in AppSec: Looking Back, Looking Forward - Adam Shostack

OWASP® Global AppSec US 2021 Virtual – Aakash Shah’s ‘Why Checking Your Infrastructure-As-Code For Misconfigurations Is Not Enough, How To Secure Your Cloud Native Applications’

Our thanks to both the OWASP® Foundation and the OWASP Global AppSec US 2021 Virtual Conference for publishing their well-crafted application security videos on the organization’s’ YouTube channel. Permalink ...
Securing Infrastructure-as-Code From Tampering and Misconfigurations

Securing Infrastructure-as-Code From Tampering and Misconfigurations

|
Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ...
Securing Infrastructure-as-Code From Tampering and Misconfigurations

Securing Infrastructure-as-Code From Tampering and Misconfigurations

|
Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ...
How to secure cloud-native applications

How to secure cloud-native applications

This article is based on the Elephant in AppSec podcast episode with Mihir Shah, a Senior Staff Application Security Engineer at ForgeRock, and the author of the Cloud Native Software Security Handbook ...

Symmetry Systems Ramps Up Hybrid-Cloud Data Security with $15 Million Series A Funding

ForgePoint Capital and Prefix Capital Double-Down on Data Store and Object Security as Lead Investors Symmetry Systems, provider of cutting-edge Data Store and Object Security (DSOS), today announced a $15 million Series A funding ...
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management ...
GitGuardian launches Software Composition Analysis to make Open Source an asset, not a threat

GitGuardian launches Software Composition Analysis to make Open Source an asset, not a threat

Read how the latest addition to GitGuardian code security platform, automates vulnerability detection, prioritization, and remediation in software dependencies, directly impacting the health of your codebase ...