Container Security 101

Containers have become a standard in development environments — for many reasons. But if not properly secured, they can increase security risks for cloud native applications and data. This e-book explores the fundamentals of container security, and explains clearly what every organization needs to know about images, registries, orchestrators and more.  
Read more

The Dangers of Open Source Software and Best Practices for Securing Code

More and more organizations are incorporating open source software into their development pipelines. After all, embracing open source products such as operating systems, code libraries, software and applications can reduce costs, introduce additional flexibility and help to accelerate delivery. Yet, open source software can introduce additional concerns into the development process—namely, security. Unlike commercial, or..
Read more

Augmenting Security the Right Way with Domino’s

Most security professionals know the tools they need to keep their business safe, yet struggle to justify the cost. What if you had a score that made it easier to prove ROI? In this webinar, hear from  Domino’s Information Security Manager what metric their security team uses to generate internal buy-in from key stakeholders. You’ll learn how organizations like yours are:  Modernizing..
Read more

The 2020 State of Compliance and Security Testing Report

A majority of companies utilize third-party vendors for security and compliance testing. However, the increasing number of major breaches show that running annual minimum compliance tests are not enough. In the 2020 State of Security and Compliance Report, read how security professionals are working to stay ahead. We compiled data from over 300 companies to better understand the current..
Read more

Build a World-Class Security Champion Program

Security champions have grown to become a critical component to successful DevSecOps organizations. These embedded change agents can be developers, DevOps engineers, or other important stakeholders in the software delivery process. Trained and empowered by the security team, they take a special interest in cybersecurity best practices. Their role is to help advocate for security,..
Read more

Identifying Web Attack Indicators

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector attackers use when breaching organizations. In this paper, we examine malicious web request patterns for four of the most common web attack methods and show how to gain the context and..
Read more