Secure-by-Design: Which Comes First, Code or Security?

For years, developers and IT security teams have been at loggerheads. While developers feel security slows progress, security teams assert that developers sacrifice security priorities in their quest to accelerate production. This disconnect results in flawed software that is vulnerable to attack. While advocates for speed and security clash, consumers must often pay the price […]

The post Secure-by-Design: Which Comes First, Code or Security? appeared first on Security Intelligence.

Continue reading Secure-by-Design: Which Comes First, Code or Security?

Why Containers in the Cloud Can Be An Attacker’s Paradise

Containers — which are lightweight software packages that include entire runtime environments — have solved the issues of portability, compatibility and rapid, controlled deployment. Containers include an application; all its dependencies, libraries and other binaries; and configuration files needed to run them. Heralding the era of microservices, Infrastructure as Code and service-oriented architectures (SOA), containers […]

The post Why Containers in the Cloud Can Be An Attacker’s Paradise appeared first on Security Intelligence.

Continue reading Why Containers in the Cloud Can Be An Attacker’s Paradise

How DevSecOps Can Secure Your CI/CD Pipeline

Many companies today automate their software development life cycle with continuous integration and continuous delivery (CI/CD). It’s part of the broader DevOps movement to speed software development while reducing errors. Continuous integration builds and tests code automatically, while continuous delivery automates the entire software release process up to production. In order to secure it, industry […]

The post How DevSecOps Can Secure Your CI/CD Pipeline appeared first on Security Intelligence.

Continue reading How DevSecOps Can Secure Your CI/CD Pipeline

Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption

Agile adoption enables security professionals to deliver high-quality, secure software and eliminate the pitfalls common to traditional strategies.

The post Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption appeared first on Security Intelligence.

Continue reading Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption

Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption

Agile adoption enables security professionals to deliver high-quality, secure software and eliminate the pitfalls common to traditional strategies.

The post Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption appeared first on Security Intelligence.

Continue reading Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption