Got Container Security? Make Sure to Secure Code and Supplemental Components

Organizations face numerous primary threats and security concerns when it comes to their container environments. Those issues extend into their build environment, an area which organizations need to protect because it’s usually ...
The Serverless Show: Serverless + Blockchain, The Comprehension Divide, Role of DevOps & More by Protego Labs

The Serverless Show: Serverless + Blockchain, The Comprehension Divide, Role of DevOps

For this Serverless Podcast, Hillel was joined by Shali Mor, Vice President, R&D and Co-founder of Protego. Watch […] The post The Serverless Show: Serverless + Blockchain, The Comprehension Divide, Role of ...

5 ways to find and fix open source vulnerabilities

A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ...
Security Boulevard's 5 Most Read Stories for the Week, July 9-13

Security Boulevard’s 5 Most Read Stories for the Week, July 9-13

A new week, a new crop of security stories. Last week, Privacy in Public Places, Fileless Malware, Spam Bots and Fake Accounts and Cryptomining Worm MassMiner made headlines. Also, we offered some ...
Security Boulevard

SOAR-native SOC, Can This Work?

| | Monitoring, security, SOAR, SOC
This post is part of our current SOC research, but it also touches on our past SOAR research. Here is the thing: when we looked at SOAR technology, we mostly saw more ...

Communication: A Significant Cultural Change for Embracing DevOps

Organizations can reap huge rewards by switching to a DevOps software development model. Some enterprises don’t know how to make the change. Recognizing that fact, I’ve spent the past few weeks discussing ...
Watching yOUr Permissions

Watching yOUr Permissions

Often, one of the main goals of a pen tester is to get Domain Admin (DA) rights in a client’s Windows network. But why do we want to get that level of ...
Control Defend Extend Container Security

Control, Defend and Extend Container Security

Some of the most common security challenges organizations face today can be boiled down to a breakdown in communication between development, operations and security teams, with security often being the last to ...
Security Boulevard

New White Paper Spotlights Methods to Avoid Cloud Misconfigurations

The post New White Paper Spotlights Methods to Avoid Cloud Misconfigurations appeared first on Delta Risk ...

BSides Springfield Preview: How To DevOps (While Sneaking in Security)

As companies embrace the DevOps phenomenon in hopes of producing applications at a faster rate, they are also introducing insecure software into the digital ecosystem. DevOps, itself, is a software lifecycle movement ...
Loading...