In Such Transformative Times, the CISO Is Key to Delivering Digital Trust

Ensuring organizations adapt while also retaining a high level of digital trust is exactly where the chief information security officer (CISO) can help.

The post In Such Transformative Times, the CISO Is Key to Delivering Digital Trust appeared first on Security Intelligence.

Continue reading In Such Transformative Times, the CISO Is Key to Delivering Digital Trust

How to Balance Speed and Security in Your Application Security Program

To compete in today’s software market, developers are under pressure to build quality code quickly. But DevOps processes that fail to account for application security are bound to miss critical flaws.

The post How to Balance Speed and Security in Your Application Security Program appeared first on Security Intelligence.

Continue reading How to Balance Speed and Security in Your Application Security Program

Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security

Ditching monolith for microservices may be right for your organization, but it’s critical to address the relevant security considerations early in the process.

The post Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security appeared first on Security Intelligence.

Continue reading Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security

Application Security Has Nothing to Do With Luck

If a safe, secure product and a satisfied customer base is the pot of gold at the end of your rainbow, it’s time to build application security processes into your development cycle.

The post Application Security Has Nothing to Do With Luck appeared first on Security Intelligence.

Continue reading Application Security Has Nothing to Do With Luck

Take Your Relationship With DevSecOps to the Next Level

Like any relationship, DevSecOps works best when there is a solid commitment, open communication and strong resolve in the face of challenges.

The post Take Your Relationship With DevSecOps to the Next Level appeared first on Security Intelligence.

Continue reading Take Your Relationship With DevSecOps to the Next Level

BSides Delaware 2018 , Jon Mosco’s (@jpmosco) ‘Introduction To Container Security In Kubernetes’

Permalink
The post BSides Delaware 2018 , Jon Mosco’s (@jpmosco) ‘Introduction To Container Security In Kubernetes’ appeared first on Security Boulevard.
Continue reading BSides Delaware 2018 , Jon Mosco’s (@jpmosco) ‘Introduction To Container Security In Kubernetes’

New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019

To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.

The post New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019 appeared first on Security Intelligence.

Continue reading New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019

Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy

In the rush to digital transformation, treating cloud security services as an afterthought to hybrid cloud adoption is an increasingly risky mistake.

The post Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy appeared first on Security Intelligence.

Continue reading Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy

Why Is the Retail Industry Still Lacking Security?

A recent survey found that the retail industry is among the least secure industries. What can retailers do to turn that around this holiday season?

The post Why Is the Retail Industry Still Lacking Security? appeared first on Security Intelligence.

Continue reading Why Is the Retail Industry Still Lacking Security?