Top 7 Tools and Tips for Improving Your DevOps Pipeline

Top 7 Tools and Tips for Improving Your DevOps Pipeline

|
Nearly two decades after the turn of the millennium, software has an impact on nearly all aspects of our lives. We use apps for learning, finding love, commerce, entertainment, and pretty much every other part of how we go about the world. Driving this steady stream of software is the ... Read More
Docker Container Security: Challenges and Best Practices

Docker Container Security: Challenges and Best Practices

|
Docker’s massive adoption rates in recent years have made container security a critical consideration for organizations that use containers for development or production. Given that containers are more complex in many respects than virtual machines and other deployment technologies that were widely used before Docker, learning how to secure Docker ... Read More
Docker Image Security Scanning

Docker Image Security Scanning: What It Can and Can’t Do

|
Docker image security scanning should be a core part of your Docker security strategy. Although image scanning won't protect you from all possible security vulnerabilities, it's the primary means of defense against security flaws or insecure code within container images. It's therefore a foundational part of overall Docker security. In ... Read More
Kubernetes Pod Security Policy Best Practices

Kubernetes Pod Security Policy Best Practices

|
In Kubernetes, pod security policies are a powerful tool for mitigating security risks and enforcing secure configurations within your Kubernetes environment. However, using Kubernetes pod security policies to maximum effect takes some effort. It’s unlikely that your default pod security policies (if in fact you have them set by default ... Read More
Top 10 Linux kernel vulnerabilities

The Top 10 Linux Kernel Vulnerabilities You Should Know

|
As one of the pillars of the open source ecosystem, the Linux kernel is one of the most influential projects in use today. Written back in the ’90s by Linus Torvalds, after whom the project is aptly named, it is available for use in open source projects under a GNU ... Read More
Your Guide to Open Source Vs Proprietary Code Security

Your Guide to Open Source Vs Proprietary Code Security

|
In an age when software relies on open source for faster, more efficient development, the debate over whether or not to use it for building applications would appear to be long over. The use of open source components is an established fact, comprising 60-80% of the code base in modern ... Read More
Docker Vulnerabilities

Top 5 Docker Vulnerabilities You Should Know

|
Offering more than just another buzzword, containers have become one of the biggest trends in software development over the past three years. Developers love their ability to package, test, and deploy their code without the hurdles that can come with transitioning from one environment to another. Leading the pack in ... Read More
bitbucket-whitesource

WhiteSource To Offer New Pipe Integration for Bitbucket

|
Software development is moving faster than ever before, with new versions barreling through the pipeline out to customers at increasingly higher speed. Supporting this wave of coding innovation is the agile CI/CD workflow that allows for better collaboration between teams, embracing the potential for speed and efficiency that was promised ... Read More
DevSecOps

DevSecOps: From Theory to Practice

|
DevSecOps has become one of the hottest buzzwords in the DevOps ecosystem over the past couple of years. In the abstract, it's easy to understand what DevSecOps means and why people care about it: It's a strategy that extends DevOps efficiencies to software security. But when you sit down and ... Read More
Container Security Scanning

3 Crucial Tips for Smarter Container Security Scanning

|
Like most trends in our industry is, first we fall in love with how much faster or smarter they allow us to get things done. It is only later after we are hooked that we remember to implement security measures that will keep our products secure. Containers have been one ... Read More
Loading...