Application Security

Application Security

5 Container Security Risks Every Company Faces

Over the course of the past 10 years, traditional application development methodology (waterfall) has given way in favor of the more agile DevOps-centric methodologies focused on continuous delivery and continuous deployment. This ...

Best open-source tools for Red Teaming

| | Penetration Testing
Best open-source Red Team tools One of the best features of the cybersecurity community is the vast number of free and open-source tools that are available. Many very smart and skilled hackers ...

Red Team operations: Best practices

| | Penetration Testing
Introduction The goal of a Red Team assessment is for the Red Team to find as many vulnerabilities as possible within the customer’s current security setup. In general, this is accomplished by ...

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state. The post The Evolution of Application Development appeared ...
The Evolution of Application Development

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state. The post The Evolution of Application Development appeared ...
Sudo Read This Warning About LPE Bug in Sudo

Sudo Read This Warning About LPE Bug in Sudo

The Sudo command can give you root access when it shouldn't. Sky falling? ...
Security Boulevard

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gaining a competitive edge. The post Agile Security Is Now A Reality appeared first on ...
Agile Security Is Now A Reality

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gaining a competitive edge. The post Agile Security Is Now A Reality appeared first on ...
Two New Features for Spanning Backup for Office 365

Two New Features for Spanning Backup for Office 365

Spanning is very pleased to announce two new features for Spanning Backup for Office 365 that we think will delight Spanning Admins and users: Contacts and Site Collections backup ...
iTunes

iTunes for Windows Zero-Day Exploited for Ransomware

Apple iTunes included a really dumb bug, which ransomware gangs have been using to attack victims’ Windows PCs ...
Security Boulevard
Loading...