Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Docker Desktop Enterprise is the best feature of Docker Enterprise 3 0

Docker Desktop Enterprise is the best feature of Docker Enterprise 3.0. Here’s why.

Docker released Enterprise 3.0, and Docker Desktop Enterprise is the big new thing in this release. Docker Desktop Enterprise, or DDE, extends the Docker Enterprise container platform to the developer's system...

What Compliance-as-Code means for your business

Have you already heard of Compliance-as-Code? Are you familiar with “compliance officers” in your organization? If not, you might be curious what 'compliance' means. Quite recently there have been some talks...
Interview with Chris Kranz and Why Sysdig

Interview with Chris Kranz – Why Sysdig

Part one of an Interview with Chris Kranz the EMEA SE Manager of Sysdig. we investigate the why, what and futures of sysdig.

Tips and tricks to secure containers for run-time environments

One of the core concepts of container security is to protect any system which runs containers. Especially when using a container orchestration tool and when running containers in production. In the...

Your secrets are (probably) everywhere – and they should not be

Where to store the secrets you need for your applications and infrastructure? A lot of sysadmins and developers face this dilemma. Not just once, but with every (new) application which is...
State of Software Security Volume X

State of Software Security Volume X

The Veracode State of Software Security represents the 10th version of the report. Much like the application security industry, the report has evolved over the past 10 years to focus more...
non-functional requirements

Guidelines to select a tool for the enterprise

Every software development team uses tools to actually build and ship software applications. Developers use tools to write the application code. Operators use tools to deploy these applications to the cloud....
How to do DevSecOps with Chef InSpec and the DevSec

How to do DevSecOps with Chef InSpec and the DevSec.io Policy-as-Code framework

It doesn’t matter what operating system you are running, you are always at risk of being attacked. Common sense will help you in defending your assets but unfortunately, this will not...
Hashicorp knocks the ball to the Boundary

Hashicorp knocks the ball to the Boundary

It only seems 5 minutes ago that Hashicorp released Boundary at their October 2020 Hashiconf online extravaganza. But like the rest of their products, it evolves at a serious pace. Quick recap...
5 Upcoming cloud computing trends for 2020

5 Upcoming cloud computing trends for 2020

The year 2019 is about to end. Less than one month left. A lot of websites already try to predict the future in their posts about upcoming cloud computing trends for...