Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Why Security Shift Left makes sense

DevOps has become a popular way of ‘shifting left’ infrastructure, making it easily consumable, in a self-service manner for developers. Tools like HashiCorp Terraform automate public cloud resource consumption and make...
DevSecOps with Veracode Getting the Greenlight on Security

DevSecOps with Veracode: Getting the Greenlight on Security

The DevOps operations model has been around for a while, but when it comes to security, it has often been an afterthought. Not that traditional development and deployment models were different,...
non-functional requirements

Guidelines to select a tool for the enterprise

Every software development team uses tools to actually build and ship software applications. Developers use tools to write the application code. Operators use tools to deploy these applications to the cloud....
5 Upcoming cloud computing trends for 2020

5 Upcoming cloud computing trends for 2020

The year 2019 is about to end. Less than one month left. A lot of websites already try to predict the future in their posts about upcoming cloud computing trends for...
State of Software Security Volume X

State of Software Security Volume X

The Veracode State of Software Security represents the 10th version of the report. Much like the application security industry, the report has evolved over the past 10 years to focus more...

Your secrets are (probably) everywhere – and they should not be

Where to store the secrets you need for your applications and infrastructure? A lot of sysadmins and developers face this dilemma. Not just once, but with every (new) application which is...

What Compliance-as-Code means for your business

Have you already heard of Compliance-as-Code? Are you familiar with “compliance officers” in your organization? If not, you might be curious what 'compliance' means. Quite recently there have been some talks...
Interview with Chris Kranz and Why Sysdig

Interview with Chris Kranz – Why Sysdig

Part one of an Interview with Chris Kranz the EMEA SE Manager of Sysdig. we investigate the why, what and futures of sysdig.

Tips and tricks to secure containers for run-time environments

One of the core concepts of container security is to protect any system which runs containers. Especially when using a container orchestration tool and when running containers in production....
Container security the static part

Container security – the static part

In one of my previous articles I wrote about the concepts of container security from a business point of view. One of the topics to start with is to secure the...
- Advertisement -