Search results: infrastructure-as-code

supply chain data secure

Supply Chain Emerging as Cloud Security Threat

Misconfigurations in software development environments and poor security hygiene in the supply chain can impact cloud infrastructure and offer opportunities for malicious actors to control unwitting victims’ software development processes. These were ...
Security Boulevard

CIS Control 4: Secure Configuration of Enterprise Assets and Software

Key Takeaways for Control 4 Most fresh installs of operating systems or applications come with pre-configured settings that are usually insecure or not properly configured with security in mind. Use the leverage ...
security technical debt

Your Security Debt is Due. Here’s How to Pay it Off 

An acceleration in major supply chain attacks, from SolarWinds to the Microsoft Exchange Server attack to the ransomware spread through Kaseya, should have every developer looking in the mirror and doing some ...
Security Boulevard
FireMon DisruptOps

FireMon Acquires DisruptOps to Extend Cloud Security Reach

| | DevSecOps, DisruptOps, Firemon, IaC
FireMon, a provider of a platform for managing network security policies, today revealed that it has acquired DisruptOps, a provider of a platform for automating the management of cloud security. Along with ...
Security Boulevard
Sysdig U.S. Infrastructure Vulnerable Russia

The Evolution of IaC, GitOps and Open Source Security

Infrastructure is now declarative language-based rather than defined through the use of screwdrivers. While the software life cycle revolves around the CI/CD pipeline, deploying all elements of the software stack from app ...
Security Boulevard