Automation

Access Governance Helps Ensure Network Security Compliance

Protecting your company’s priceless data means making sure of two things: that the right people have access to the correct…

6 months ago

Automation: Helping Speed Vulnerability Response

Automation can help organizations respond to vulnerabilities faster and improve their security posture Enterprises across the globe are recognizing the…

7 months ago

DevSecOps Delivered: Automated GitHub Pull Requests

In this episode of DevSecOps Delivered, we demonstrate how to use the Github automated pull requests integration in Nexus Lifecycle.…

8 months ago

Automatic Instacart Bots

Instacart is taking legal action against bots that automatically place orders: Before it closed, to use Cartdash users first selected…

8 months ago

Keep Applications Secure in Atlassian Bitbucket with Automated Pull Requests

As development organizations seek to innovate faster and build more secure applications at scale, one of the trends we’re seeing…

8 months ago

Qualys Delivers on Promise to Automate Endpoint Security

Qualys this week announced the availability of a Vulnerability Management, Detection and Response (VMDR) platform based on a single agent…

8 months ago

Security Orchestration, Automation and Response: Everything You Need to Know to Get Started

Security operations is a well-established discipline — many businesses have even had SecOps strategies in place for decades. Yet the...…

8 months ago

How to Upskill Your DevOps

Editor's Note: Improving skills is always a good idea. With this in mind, don't miss the upcoming All Day DevOps…

9 months ago

Developers Gain Contextual Feedback with Automated Pull Request Commenting

At Sonatype, we work continuously to increase awareness of open source risk, and decrease the time it takes you to…

9 months ago

Contrast Security Advances DevSecOps

Contrast Security this week added a Route Intelligence module to a Contrast Assess vulnerability assessment that automates the code scanning…

9 months ago