DevOps

Palo Alto Networks XSOAR Integration: Maximizing Automation for Incident Detection and Remediation

Automation is becoming more and more prevalent and sought after by Security Operations Centers (SOC). This is driven by the…

2 days ago

Open Source Does Not Equal Secure

Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people…

3 days ago

The difference between Monitoring and Observability

Legacy methods based on handling predictable failures often do not work well while monitoring modern distributed applications. Efficient debugging and…

3 days ago

SWAP Detector: Preventing API Errors from Swapped Arguments

Third-party application programming interfaces (APIs), libraries, and frameworks are a fact for modern software developers. They are usually complex, rapidly…

4 days ago

How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care

Technology is transforming the way healthcare organizations deliver patient care. As people continue to hold their… The post How a…

5 days ago

How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOs

As federal agencies develop more online services and systems to meet the mission of the U.S. government, their appetite and…

6 days ago

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Sonrai Security has sponsored and moderated boardroom discussions with Evanta CISOs and we wanted to share our key public cloud…

6 days ago

Remote workforce, web portal, and DevSecOps: Three focus areas for cybersecurity

According to the 2020 Deloitte-NASCIO Cybersecurity Study for state governments, 54 percent of states are not confident in their ability…

1 week ago

DevSecOps: 4 Reasons You Need One

Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what…

2 weeks ago

The Evolution of Cloud Security Posture Management

Get the right CSPM platform to automate your cloud against hundreds of configuration and security best practices. The post The…

2 weeks ago