Home Security Page 3

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Security_IaC

Integrating Security into your Infrastructure-as-Code pipelines

Security is often left at the back of the queue when developing code, Priority is on Minimal Viable Product, and after delivering a feature, it's quickly on to the next. The...
GitLab-Ramps-Up-Channel-and-Partner-Investment-with-Launch-of-a-New-Global-Partner-Program (1)

GitLab ramps up channel and partner investment with launch of new partner program

Today Amazic, a trusted supplier and solution advisor for partners, announced they have joined forces with GitLab, the single application for the DevOps lifecycle, to accelerate DevOps practice buildout and go-to-market...
DevSecOps with Veracode Getting the Greenlight on Security

DevSecOps with Veracode: Getting the Greenlight on Security

The DevOps operations model has been around for a while, but when it comes to security, it has often been an afterthought. Not that traditional development and deployment models were different,...
Segregation of duties

Kubernetes security considerations & best practices

As of now we are in the middle of a big boost in Kubernetes adoption. The number of organizations deploying containers in production using this popular orchestration tool grows every week....

eBook: Kubernetes Security Guide

Download this guide to learn best practices for implementing Kubernetes and container security. Kubernetes has become the de facto operating system of the cloud. However, Kubernetes can be challenging to operate. Teams...

Time for 20/20 vision – here’s 7 trends for DevOps in 2020

A top 10 prediction list of the potential movers and shakers in 2020.
MobiledgeX Cloud Foundations

MobiledgeX is the Amazon of Edge Computing

We all know Amazon.com, the online retailer. In the Netherlands, we have similar 'platform' players, that, for a fee, will let 3rd party resellers sell their inventory via the site. It's...
The App Factory A slow movement towards rapid change

The App Factory: A slow movement towards rapid change

Download this whitepaper to learn how to remove silos and increase visibility. As the increasing need for dependable applications proliferates across nearly every industry, many organizations rush to release apps that do...
Going serverless

Going serverless: considerations for your organization

One of the latest cloud computing trends is to use serverless computing for deploy software applications. But what is serverless? In short: organizations do not maintain Virtual Machines or containers anymore....
Runtime security with Sysdig Falco

Runtime security with Sysdig Falco

Lately I've been researching possibilities to detect anomalies during runtime in containers. I came across the open source project Sysdig Falco which seems to do just that. Quoted from their site:...