Supply Chain Emerging as Cloud Security Threat
Misconfigurations in software development environments and poor security hygiene in the supply chain can impact cloud infrastructure and offer opportunities for malicious actors to control unwitting victims’ software development processes. These were ...
CIS Control 4: Secure Configuration of Enterprise Assets and Software
Key Takeaways for Control 4 Most fresh installs of operating systems or applications come with pre-configured settings that are usually insecure or not properly configured with security in mind. Use the leverage ...
Your Security Debt is Due. Here’s How to Pay it Off
An acceleration in major supply chain attacks, from SolarWinds to the Microsoft Exchange Server attack to the ransomware spread through Kaseya, should have every developer looking in the mirror and doing some ...
FireMon Acquires DisruptOps to Extend Cloud Security Reach
FireMon, a provider of a platform for managing network security policies, today revealed that it has acquired DisruptOps, a provider of a platform for automating the management of cloud security. Along with ...
The Evolution of IaC, GitOps and Open Source Security
Infrastructure is now declarative language-based rather than defined through the use of screwdrivers. While the software life cycle revolves around the CI/CD pipeline, deploying all elements of the software stack from app ...