How do you build in the capability to automate the ability to discover and apply security patches in your ci/cd pipeline?

Within a DevSecOps Ci/Cd pipeline, one of the best practices is to automatically discover and apply patches to vulnerable software prior to deployment.
Is it possible to check a CVE database, find patches, and then deploy? I want to build … Continue reading How do you build in the capability to automate the ability to discover and apply security patches in your ci/cd pipeline?

Is security becoming a priority for DevOps teams?

GitLab released the results of its annual DevSecOps survey which highlights the continued prioritization of security and compliance, investment in toolchain consolidation, and the ongoing impacts of rapid DevOps adoption. The survey consisted of 5,001 … Continue reading Is security becoming a priority for DevOps teams?

Controlling the Source: Abusing Source Code Management Systems

For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management Systems”. This material is also being presented at Black Hat USA 2022. Source Code Management (SCM) systems play a vital role within organizations and have been an afterthought in terms of defenses compared to other critical enterprise […]

The post Controlling the Source: Abusing Source Code Management Systems appeared first on Security Intelligence.

Continue reading Controlling the Source: Abusing Source Code Management Systems

10 Application Security Best Practices To Follow In 2022

By Waqas
In recent years, the app development industry has experienced unprecedented growth. Mobile applications and web applications have become…
This is a post from HackRead.com Read the original post: 10 Application Security Best Practices To … Continue reading 10 Application Security Best Practices To Follow In 2022

The benefits of implementing continuous security in the development lifecycle

Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of development and security, as well as the benefits of continuous security. Participan… Continue reading The benefits of implementing continuous security in the development lifecycle

Cloud-native adoption shifts security responsibility across teams

Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during their digital transformation journeys. As organizations increase adoption, the re… Continue reading Cloud-native adoption shifts security responsibility across teams

Take a dev-centric approach to cloud-native AppSec testing

The era of the cloud-native application is well and truly upon us: IDC researchers have predicted that by 2023, more that 500 million apps will be developed using cloud-native approaches! While some applications are still being built on a monolithic (a… Continue reading Take a dev-centric approach to cloud-native AppSec testing