DevOps
If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right
Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...
Visual Notes : SolarWinds Supply Chain compromise using SUNBURST backdoor (detected by FireEye)
Visual Notes : SolarWinds Supply Chain compromise using SUNBURST backdoor (detected by FireEye)First, let me be clear that I have no insider knowledge. This is my best guess at what occurred, based on publicly ...
95% of Organizations Admit To at Least One Successful Application Exploit in Past Year
Findings and Insights from Contrast Security’s 2020 State of DevSecOps Report ...
An Observability Balancing Act With Gitops
As companies intensify their push towards adopting DevOps practices and cultural values, there are several practical methodologies cropping up. One such concept is GitOps which stems from the DevOps need of automating ...
Strengthening Observability With Dashboard as Code
As DevOps takes grip of the software industry, an inevitable left-shift is noted under the philosophy of “you build it you run it”. It is this philosophy we now see emerging in ...
Under the Hood of Simon Data’s World-Class Application Security Program
Are you curious how CISOs with major data platforms handle their application security testing programs? So are we, which… The post Under the Hood of Simon Data’s World-Class Application Security Program appeared ...
How DevOps Tools Can Help Publishers Thrive
Agility has proven to be a key weapon in the publisher arsenal during the pandemic. Agile firms -- particularly news publishers -- that switched directions or added digital services quickly reaped the ...
Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVID
In 2020, “digital transformation” went from a buzzword to reality. Businesses and governments alike experienced first-hand what it meant to undergo rapid, high-stakes transformation in the way they operate, and many are ...
Palo Alto Networks XSOAR Integration: Maximizing Automation for Incident Detection and Remediation
Automation is becoming more and more prevalent and sought after by Security Operations Centers (SOC). This is driven by the increasing cybersecurity skills gap, intensified by the volume of security data and ...
Open Source Does Not Equal Secure
Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people will examine it for security flaws. Security researchers are fickle and busy ...
