Renewable Security: Steps to Save The Cyber Security Planet

Renewable Security: Steps to Save The Cyber Security Planet

Actually, this has nothing to-do with being green. Although, that is a passion of mine. This is more to-do with a paradigm that is becoming more popular in security architectures: that of ...
Container Security Part 3 – Kubernetes Cheat Sheet

Container Security Part 3 – Kubernetes Cheat Sheet

During the first two articles of this series, we went from some initial research as a “Quick Dive into Containers, Kubernetes and Security” to a more detailed look at the first steps ...
Security Challenges Related to Containers

Security Challenges Related to Containers

| | aria sds, containers, DEVOPS, SecDevOps, security
The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of slowing down, but it raises many new security challenges. This article takes ...
Top 4 Questions to Ask About Compliance, Security, and Containers

Top 4 Questions to Ask About Compliance, Security, and Containers

Introducing containers into cloud infrastructure can lead to faster development cycles as well as more efficient use of infrastructure resources. With these kinds of competitive advantages, it’s no wonder why container orchestration ...
Securing containers at scale

Securing containers at scale

Open source is the foundation of most modern applications. However, left untracked, open source can put containerized applications at risk of known vulnerabilities such as Heartbleed and CVE-2017-5638 found in Apache Struts ...

Mastering Container Security: Docker, Kubernetes and More

Bolting on security after the fact. It’s been a common approach to software security for decades. We architect, build code, deploy it and then figure out how to secure it. From the ...
Stop Writing Classes

A Clean Start: Finding Vulnerabilities in your Docker Base Images

The ability to find and use a free public Docker base image makes it easy to bootstrap the creation of a new Microservice. However, “easy” doesn’t equate to “good.” Using a Docker ...
Hacking and Hardening Kubernetes Clusters by Example [I] - Brad Geesaman, Symantec

Container Security Part 2 – Benchmarks to the Rescue

Containers are like BYOD (Bring Your Own Device). They are infiltrating our ranks, and InfoSec professionals’ gut reaction is to hesitate in including them in their environments. But instead of dismissing containers ...
Black Duck By Synopsys FLIGHT 2018

Register now to join us at FLIGHT East 2018 in Boston

Every time we host a Black Duck FLIGHT conference I’m amazed at how much great information there is, how many in-depth discussions happen, and how much I learn from our customers who ...

Security as a Quality Gate for DevOps

| | containers, DEVOPS, DevSecOps
It’s hardly a controversial statement to say that DevOps is changing the way that organizations build and deploy applications. There’s plenty of material, stories, whitepapers and whole companies that demonstrate this trend ...
Loading...