You searched for infrastructure-as-code - Security Boulevard

Search results: infrastructure-as-code

Securing Infrastructure-as-Code From Tampering and Misconfigurations

Securing Infrastructure-as-Code From Tampering and Misconfigurations

|
Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ...
malware wiper file systems storage Zerologon

How to Proactively Remove File-Based Malware

There’s no question that the past 18 months have been challenging for technology and cybersecurity leaders. Cyberthreats have skyrocketed at a time when companies have been enabling hybrid workforce models and transforming ...
Security Boulevard

CIS Control 12: Network Infrastructure Management

Networks form a critical core for our modern-day society and businesses. These networks are comprised of many types of components that make up the networks’ infrastructure. Network infrastructure devices can be physical ...
Aviatrix Palo Alto Networks Qualys cloud

Palo Alto Networks Extends Cloud Security Portfolio

At its online Ignite ’21 conference, Palo Alto Networks today unfurled the Prisma Cloud 3.0 security platform that adds tools for securing cloud infrastructure along with an agentless option for securing applications ...
Security Boulevard
Lacework Zerologon Malware Complacency

Lacework Acquires Soluble to Improve Cloud Security

Lacework this week revealed it has acquired Soluble, a provider of a platform for remediating code that was created to provision infrastructure. At the same time, Lacework has added an inline vulnerability ...
Security Boulevard

Eureka! How Pulumi Brought Sanity to Our DevOps Team

I started out my professional career as a software developer then became a DevOps engineer. (Get it? It’s a joke.) The irony is that DevOps is not an engineering discipline at all, ...
DevOps Access Controls for CI/CD, GitOps, and More

DevOps Access Controls for CI/CD, GitOps, and More

|
Over the last few years, the term DevOps and DevSecOps (which stand for Developer Operations and Developer Security Operations respectively) have become synonymous with companies trying to become more agile and less ...
Fixing Hardcoded Secrets the Developer-Friendly Way

Fixing Hardcoded Secrets the Developer-Friendly Way

|
The practice of hard-coding secrets like passwords, tokens, and API keys is skyrocketing as applications increasingly leverage dependencies that require integration and Infrastructure-as-Code that must authenticate services. Yet, hardcoded secrets have been ...
supply chain data secure

Supply Chain Emerging as Cloud Security Threat

Misconfigurations in software development environments and poor security hygiene in the supply chain can impact cloud infrastructure and offer opportunities for malicious actors to control unwitting victims’ software development processes. These were ...
Security Boulevard

CIS Control 4: Secure Configuration of Enterprise Assets and Software

Key Takeaways for Control 4 Most fresh installs of operating systems or applications come with pre-configured settings that are usually insecure or not properly configured with security in mind. Use the leverage ...

Posts

Categories

Month

:)