Home Security Page 3

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Storage and connectivity

Edge computing explained and what you need to know

It could very well be the case you have already heard of edge computing. Many organizations already use edge computing in their day-to-day business. Before we dive into more details about...

Time for 20/20 vision – here’s 7 trends for DevOps in 2020

A top 10 prediction list of the potential movers and shakers in 2020.

Refactoring helps DevOps initiatives in your organization

Every developer can give you examples of applications of which the code base is like spaghetti code. Plenty of reasons why an application might end up in such a situation. Often,...
Going serverless

Going serverless: considerations for your organization

One of the latest cloud computing trends is to use serverless computing for deploy software applications. But what is serverless? In short: organizations do not maintain Virtual Machines or containers anymore....

Why Security Shift Left makes sense

DevOps has become a popular way of ‘shifting left’ infrastructure, making it easily consumable, in a self-service manner for developers. Tools like HashiCorp Terraform automate public cloud resource consumption and make...
DevSecOps with Veracode Getting the Greenlight on Security

DevSecOps with Veracode: Getting the Greenlight on Security

The DevOps operations model has been around for a while, but when it comes to security, it has often been an afterthought. Not that traditional development and deployment models were different,...
non-functional requirements

Guidelines to select a tool for the enterprise

Every software development team uses tools to actually build and ship software applications. Developers use tools to write the application code. Operators use tools to deploy these applications to the cloud....
5 Upcoming cloud computing trends for 2020

5 Upcoming cloud computing trends for 2020

The year 2019 is about to end. Less than one month left. A lot of websites already try to predict the future in their posts about upcoming cloud computing trends for...
State of Software Security Volume X

State of Software Security Volume X

The Veracode State of Software Security represents the 10th version of the report. Much like the application security industry, the report has evolved over the past 10 years to focus more...

Your secrets are (probably) everywhere – and they should not be

Where to store the secrets you need for your applications and infrastructure? A lot of sysadmins and developers face this dilemma. Not just once, but with every (new) application which is...