Featured Library - Security Boulevard

Application Security: The Best/Worst Is Yet to Come

In the wake of recent high-profile breaches, all eyes are on application security. Yet, application security hasn’t always received the attention during the application development process it deserves. Many organizations deploy applications with known vulnerabilities to meet their deadlines, with the idea that they’ll be addressed in the next update. That’s a dangerous gamble. DevSecOps..
Read more

Adopting a Strategic Mindset for Cloud-Native Application Protection

With more applications being developed in a cloud-native fashion, using containers and serverless architecture, organizations should think about smarter, more efficient and more reliable ways to protect their applications. Cyberattackers are more innovative and are achieving more success in compromising cloud-native applications, so vigilance is a must for developers, security professionals and IT organizations. Download..
Read more

Identity: The Real Key to Security

Identity and access management (IAM) has long been touted as an effective way to ensure data security by providing access only to those who have the correct permissions. In today’s increasingly distributed IT environment, more organizations look for zero-trust computing architectures that rely on more sophisticated approaches to IAM based on multi-factor authentication. Download this..
Read more

Cybersecurity Turns the COVID-19 Corner

The COVID-19 pandemic has proven to be a defining moment for cybersecurity. Security perimeters crumbled overnight as entire workforces started working from home, and most gave little thought to the security implications. From a cybersecurity perspective, change reigned. In 2021, many cybersecurity teams are still working to adjust to a new reality. In theory, once..
Read more

Heading Off a Cloud Security Crisis

Application workloads deployed in the cloud, in theory at least, should be more secure than those deployed on-premises, because a cloud service provider has all the expertise required to secure those platforms. Organizations run into trouble, however, when responsibility for cloud security is shared between the cloud service provider and the IT personnel that deploy..
Read more

AWS Security Case Study: Visibility into Containers Provides Application Context

Poka is a connected worker application built specifically for manufacturers. It brings together collaboration, training, and skills management into a single integrated platform to empower factory workers to learn continuously and solve problems autonomously. Designed from the ground-up as a cloud native application, Poka lets companies build their own proprietary knowledge base to use and..
Read more