Boulevard Library

Security Boulevard Library

Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more – all that will help you in your security journey. Access requires only a free registration. Search, scroll through and download what you like.

The Developer's Guide to the DevSecOps Galaxy

The Developer’s Guide to the DevSecOps Galaxy

As organizations look to fully harness the power of digital tools and technologies, developers are having to rewire the way they work, along with underlying workflows. One approach that’s gained enormous popularity is DevOps. It revolves around faster, better collaboration and communication for teams building, testing, and releasing software. When ... Read more
Five Principles for Securing DevOps

Five Principles for Securing DevOps

DevOps, a new organizational and cultural way of organizing development and IT operations work, and its sister technologies, continuous integration and continuous deployment (CI/CD), have transformed the way we create software. And there is widespread evidence that DevOps practices, despite their substantial organizational, cultural and technological requirements, are spreading rapidly ... Read more
Don't Let Security Put the Brakes on DevOps

Don’t Let Security Put the Brakes on DevOps

As DevOps model achieves wider adoption in the enterprise, security teams have often been excluded, largely because current security tools and processes were not built for automated toolchains – they add both time and cost to the development cycle, which is anathema to the DevOps model ... Read more
CloudPassage
The DevSecOps Approach to Securing Your Code and Your Cloud

The DevSecOps Approach to Securing Your Code and Your Cloud

DevSecOps, at heart, is about collaboration. More specifically, it is continual collaboration between information security, application development and IT operations teams. Having all three teams immersed in all development and deployment activities makes it easier for information security teams to integrate controls into the deployment pipeline without causing delays or ... Read more
CloudPassage
A New Approach for Securing DevOps Environments in the Cloud

A New Approach for Securing DevOps Environments in the Cloud

Today's, high-performing teams deploy on demand or multiple times per day, and they can deploy changes to production in less than an hour. Servers themselves may exist for less than an hour. This rapid pace is leaving security teams behind. And the massive gap between code being deployed within hours ... Read more
CloudPassage
Gartner DevSecOps: How to Seamlessly Integrate Security Into DevOps

Gartner DevSecOps: How to Seamlessly Integrate Security Into DevOps

Information security architects must integrate security at multiple points into DevOps workflows where it’s largely transparent to developers. Traditional static or dynamic security testing is too heavyweight, complex and won’t work or scale for DevOps. Read this Gartner research to get strong recommendations on how you can preserve the speed ... Read more
Run-Time Container Security Guide

Run-Time Container Security Guide

This guide is brought to you by NeuVector, the leader in Application-aware Run-time Container Security. Discover running applications, services and processes, and apply the built-in security policies for them. Monitor running containers for violations, threats, and vulnerabilities, and protect your containers from suspicious activity with no manual policies required ... Read more
NeuVector
How to Securely Configure a Linux Host to Run Containers

How to Securely Configure a Linux Host to Run Containers

This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely ... Read more
Twistlock
How to Achieve Continuous Container Security

How to Achieve Continuous Container Security

There’s been a lot of progress enabling companies to implement a container-based continuous integration and continuous delivery (CI/CD) pipeline. But when it’s time for deployment into production, how can enterprises make sure continuous security is also built into the process? Download this free e-book from NeuVector ... Read more
NeuVector