Do You Know Your Responsibilities When It Comes to Container Security?

Even some of the best cloud service providers (CSPs) won’t provide sufficient container security to satisfy your compliance needs.

The post Do You Know Your Responsibilities When It Comes to Container Security? appeared first on Security Intelligence.

Continue reading Do You Know Your Responsibilities When It Comes to Container Security?

DevSecOps: The Best Security Strategy in 2020

Moving to a DevSecOps way of development ensures security from day one and reduces the possibility of data breaches later on Too often, developers overlook security testing until the end of the development cycle. By the time an application is up and r… Continue reading DevSecOps: The Best Security Strategy in 2020

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. Learn more about building a threat model.

The post A Guide to Easy and Effective Threat Modeling appeared first on Security Intelligence.

Continue reading A Guide to Easy and Effective Threat Modeling

What Is Sign in with Apple’s Impact on Development?

 With more than 5 billion mobile phones on the market around the globe, mobile security is more important than ever. And the recent announcement from Apple around its Sign in with Apple guidelines brings privacy even more into the spotlight. It’s no d… Continue reading What Is Sign in with Apple’s Impact on Development?

DevOps Chats: Analyzing WhiteHat Security’s DevSecOps Survey Results

WhiteHat Security is one of the pioneers in AppSec. As such, the company was an early advocate for DevSecOps. WhiteHat has been doing annual surveys of the security and developer space for several years. In this year’s survey, the good news is th… Continue reading DevOps Chats: Analyzing WhiteHat Security’s DevSecOps Survey Results

“This is the New Op Model” – Why State Farm Sponsored ADDO, and the Results

Sonatype is among the many supporters of All Day DevOps (ADDO), the world’s largest conference for DevOps practitioners. Close to 40,000 people attended this year’s 24-hour event — and 10% of them were from one company. We spoke with … Continue reading “This is the New Op Model” – Why State Farm Sponsored ADDO, and the Results

How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home

Technology has enabled employees to work from the office, from home and pretty much everywhere in between. Unfortunately, many employees still aren’t connecting to secure Wi-Fi, putting data at risk.

The post How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home appeared first on Security Intelligence.

Continue reading How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home

6 Steps to Modernize Your On-Premises Identity and Access Management Architecture

With IT staff struggling to keep up with help desk tickets and users drowning in a sea of passwords, organizations are looking to centralize identity and access management (IAM) in the cloud.

The post 6 Steps to Modernize Your On-Premises Identity and Access Management Architecture appeared first on Security Intelligence.

Continue reading 6 Steps to Modernize Your On-Premises Identity and Access Management Architecture

Does Your Organization ‘Get’ Chaos Engineering?

Chaos engineering aims to prevent security issues and outages before they happen. So why aren’t more organizations using it? In many ways, the cloud computing movement has simplified technology infrastructure for organizations across the globe. … Continue reading Does Your Organization ‘Get’ Chaos Engineering?