Category List

Product Update: What’s New in Version 5.1 of the Siemplify Security Operations Platform

Security professionals are constantly inundated with information about “breakthrough” products claiming to “change the face” of <insert product category... The post Product Update: What’s New in Version 5.1 of the Siemplify Security ...

Accelerate: A Principle-based DevOps Framework

In this article series, we’re discussing the following three principle-based DevOps frameworks. The first was The Three Ways as described in The Phoenix Project and The DevOps Handbook ...
Mac Security Blog Infographic Osquery Background BLOG

[Infographic] macOS Native Security Configurations and osquery

Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to ...

Three Ways: A Principle-based DevOps Framework

In our first two articles in the DevOps track of Educational Foundations, we: Dispelled some DevOps misconceptions and presented our own principle-based definition of DevOps Presented the business case for DevOps, including ...
Large Applications, Monoliths — Struggling with code analysis? Read on!

Large Applications, Monoliths — Struggling with code analysis? Read on!

Large Applications, Monoliths — Struggling with code analysis? Read on!ShiftLeft Ocular makes code analysis of large applications fast, automated and very very efficient. It can analyze an entire linux kernel with in 40–50 minutes.Our ...
Case Files: Outbidding

Case Files: Outbidding

In my previous post, we witnessed a vendor partnership flaw that was exploited. Let us now situate ourselves in an online auction event.Online auctions offer buyers and sellers of a wide variety ...

APIs Ease Customer Interaction — and External Attacks. Here’s how to Protect Them.

To deliver seamless service experiences to our customers, businesses now rely heavily on application programming interfaces (APIs). These are a non-negotiable aspect of the way we streamline the interactions and conversations we ...
Kubernetes in 10 seconds

Kubernetes in 10 Seconds

Sonatype’s DJ Schleen (@djschleen) demonstrates Kubernetes in 10 seconds: ...
SCA Data rolled up into the dashboard in Fortify on Demand

New Micro Focus, Sonatype Partnership Provides 360 Degree View of AppSec

In today’s world, we know that most security breaches occur because of application vulnerabilities. We also know that most typical software applications are, on average, comprised of 85% open source software. These ...

Integrating Security to DevOps: Fundamental Principles Are Crucial!

| | DEVOPS
Changing consumer demands posed a serious challenge to the IT industry; it pushed firms to brainstorm about quick product delivery. This demand eventually gave rise to the demand for collaboration between Development ...
Loading...