Securing the 'New Network'

Securing the ‘New Network’

Network security is a different undertaking with today’s new network In today’s business environment, containers and microservices have enabled organizations to meet constantly changing and increasing demand, but they have also changed ...
Security Boulevard
cloud

Achieve CIS Compliance in Cloud, Container and DevOps Environments

| | CIS, Cloud, Complaince, containers, DEVOPS, policy
If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies up to date with these new technologies. New security techniques are required ...
Webinar: Secure your containers with GitHub and Synopsys

Webinar: Secure your containers with GitHub and Synopsys

In April, Synopsys and GitHub spoke about adding “Sec” to DevOps by using solutions that don’t sacrifice speed or agility. Most of the discussion focused on software composition analysis for applications. But ...
Renewable Security: Steps to Save The Cyber Security Planet

Renewable Security: Steps to Save The Cyber Security Planet

Actually, this has nothing to-do with being green. Although, that is a passion of mine. This is more to-do with a paradigm that is becoming more popular in security architectures: that of ...
Container Security Part 3 – Kubernetes Cheat Sheet

Container Security Part 3 – Kubernetes Cheat Sheet

During the first two articles of this series, we went from some initial research as a “Quick Dive into Containers, Kubernetes and Security” to a more detailed look at the first steps ...
Security Challenges Related to Containers

Security Challenges Related to Containers

| | aria sds, containers, DEVOPS, SecDevOps, security
The use of containers has exploded recently and become integral to application development processes. The trend shows no sign of slowing down, but it raises many new security challenges. This article takes ...
Top 4 Questions to Ask About Compliance, Security, and Containers

Top 4 Questions to Ask About Compliance, Security, and Containers

Introducing containers into cloud infrastructure can lead to faster development cycles as well as more efficient use of infrastructure resources. With these kinds of competitive advantages, it’s no wonder why container orchestration ...
Securing containers at scale

Securing containers at scale

Open source is the foundation of most modern applications. However, left untracked, open source can put containerized applications at risk of known vulnerabilities such as Heartbleed and CVE-2017-5638 found in Apache Struts ...

Mastering Container Security: Docker, Kubernetes and More

Bolting on security after the fact. It’s been a common approach to software security for decades. We architect, build code, deploy it and then figure out how to secure it. From the ...
Stop Writing Classes

A Clean Start: Finding Vulnerabilities in your Docker Base Images

The ability to find and use a free public Docker base image makes it easy to bootstrap the creation of a new Microservice. However, “easy” doesn’t equate to “good.” Using a Docker ...
Loading...