Home Security Page 2

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Docker Desktop Enterprise is the best feature of Docker Enterprise 3 0

Docker Desktop Enterprise is the best feature of Docker Enterprise 3.0. Here’s why.

Docker released Enterprise 3.0, and Docker Desktop Enterprise is the big new thing in this release. Docker Desktop Enterprise, or DDE, extends the Docker Enterprise container platform to the developer's system...

What Compliance-as-Code means for your business

Have you already heard of Compliance-as-Code? Are you familiar with “compliance officers” in your organization? If not, you might be curious what 'compliance' means. Quite recently there have been some talks...
Interview with Chris Kranz and Why Sysdig

Interview with Chris Kranz – Why Sysdig

Part one of an Interview with Chris Kranz the EMEA SE Manager of Sysdig. we investigate the why, what and futures of sysdig.

Tips and tricks to secure containers for run-time environments

One of the core concepts of container security is to protect any system which runs containers. Especially when using a container orchestration tool and when running containers in production....

Your secrets are (probably) everywhere – and they should not be

Where to store the secrets you need for your applications and infrastructure? A lot of sysadmins and developers face this dilemma. Not just once, but with every (new) application which is...
State of Software Security Volume X

State of Software Security Volume X

The Veracode State of Software Security represents the 10th version of the report. Much like the application security industry, the report has evolved over the past 10 years to focus more...
non-functional requirements

Guidelines to select a tool for the enterprise

Every software development team uses tools to actually build and ship software applications. Developers use tools to write the application code. Operators use tools to deploy these applications to the cloud....
Storage and connectivity

Edge computing explained and what you need to know

It could very well be the case you have already heard of edge computing. Many organizations already use edge computing in their day-to-day business. Before we dive into more details about...
Meet-Pulumi-infrastructure-management-with-your-favorite-programming-language

Meet Pulumi: infrastructure management with your favorite programming language

Since Infrastructure as Code is now the defacto standard to set up and maintain infrastructure, the number of tools to do this and frameworks grows. Perhaps all organizations know CloudFormation for...
Code review tips and tricks

Code review tips and tricks to improve security

In an agile world, security can be a time consuming effort that slows down the software delivery processes. However, security topics should not be ignored or shifted to the very last...