Are businesses ready to implement cloud-native development?

OutSystems released findings from a global survey of IT leaders and developers gauging the benefits and challenges of cloud-native development, with results highlighting stark contrasts between expectations and readiness. The report reveals that while … Continue reading Are businesses ready to implement cloud-native development?

Principles for Kubernetes security and good hygiene

Traditional methods of software security are not a good fit for Kubernetes: a renewed set of security implementations are required to make it less vulnerable. What’s different about Kubernetes security? This article walks through several key idea… Continue reading Principles for Kubernetes security and good hygiene

81% of codebases contain known open source vulnerabilities

Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and highlights trends in open source usage within commercial and proprietary applications … Continue reading 81% of codebases contain known open source vulnerabilities

86% of developers don’t prioritize application security

Secure Code Warrior released findings from its survey, which found that developers’ actions and attitudes toward software security are in conflict. While many developers acknowledge the importance of applying a security-led approach in the software dev… Continue reading 86% of developers don’t prioritize application security

JavaScript security: The importance of prioritizing the client side

In this interview with Help Net Security, Vitaly Lim, CTO at Feroot, talks about the most common JavaScript threats, the devastating impact of malicious or vulnerable code, and the importance of JavaScript security in the development process. We’re hea… Continue reading JavaScript security: The importance of prioritizing the client side

Why low-code and identity must co-exist

Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, building, testing, and verifying major chunks of code usually takes months &#821… Continue reading Why low-code and identity must co-exist

Increasing security for single page applications (SPAs)

Single page applications (SPAs) have become the most popular way to create websites that feel faster for the end-user without hitting the server every time a user interacts with an application. Shifting away from the traditional cookie-based approach, … Continue reading Increasing security for single page applications (SPAs)

Solving the problem of secrets sprawling in corporate codebases

GitGuardian announced the results of its report which extends its previous edition focused on public GitHub by depicting a realistic view of the state of secrets sprawl in corporate codebases. The data reveals that on average, in 2021, a typical compan… Continue reading Solving the problem of secrets sprawling in corporate codebases

Data leaks and shadow assets greatly exposing organizations to cyberattacks

CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. The report also highlights how the market pressures of 2021 led to an increas… Continue reading Data leaks and shadow assets greatly exposing organizations to cyberattacks