Three Mechanisms to Protect Your Git Repositories

Three Mechanisms to Protect Your Git Repositories

...despite all intentions to follow best practices, they don't. When you automate enforcement of best practices, you can ensure those practices are followed ...
How GitOps Raises the Stakes for Application Security

How GitOps Raises the Stakes for Application Security

The rise of GitOps comes from the industry’s increased adoption of Kubernetes. As organizations and teams shift towards Kubernetes, scaling their cluster management practices becomes imperative as teams and workloads grow in ...
DevSecOps formula

Dev + Sec + Ops != DevSecOps

Dev + Sec + Ops ! = DevSecOpsDevSecOps formulaHistorically, security vendors and code scientists around the world have been looking for a single universal formula to represent the notion of DevSecOps.In my ...
Ransomwear

Git Code Repos Held to Ransom – Thousands Hacked

Many private Git repositories are at risk of being leaked to the public. Anonymous hackers have wiped the code and are demanding Bitcoin. Or else they’ll open-source it for you. And then ...
Security Boulevard
Wind River Star Lab

Study: Most Home Routers Have Unpatched Vulnerabilities

A study performed by the non-profit American Consumer Institute (ACI) Center for Citizen Research revealed that the majority of home routers have tens of known vulnerabilities. For its research, the ACI used ...
Security Boulevard
security testing

Git Vulnerability Leads to Remote Code Execution

A new version of the widely used Git version control system fixes a vulnerability that allows malicious code repositories to execute code on client computers when being cloned. Originally created for Linux ...
Security Boulevard