Collect data, analyze, and respond

Strategies for the Cloud Threat Hunter

Threat hunting, like all cloud security, is rendered additionally difficult by high volumes of transactions and the high velocity of deployments. Security professionals face constantly evolving landscapes as their company infrastructures change and cloud providers offer new tools. While standard and cloud threat modeling share basic methodologies and joint purposes, there are meaningful differences.

Interview with Paul Farrington, CPO at Glasswall

“File-based threats should not be underestimated”

We spoke with Paul Farrington, CPO at Glasswall about Content Disarm and Reconstruction technology, how it is used, and how it helps against file-based threats. Paul gives his advice regarding security measures, file-based threats, and how developers can best achieve top-notch security practices.

Look out for the signs

Managing burnout in innovative, fast paced industries

In this article, organisational psychologists, consultants and co-founders of award-winning Monkey Puzzle Training and Consultancy Karen Meager and John McLachlan discuss burnout mental health in tech. How can burnout be avoided and what are the warning signs?

Change and growth

Three trends in enterprise open source

What is the current state of enterprise open source, and how has this been changed with the pace of digital transformation? This article looks at Red Hat’s State of Enterprise Open Source report and digs into the top trends in the enterprise open source community during this time of change and growth.

Overcome technical skills gaps and scale automation

Making DevSecOps an automated reality

It’s no secret that DevSecOps with its speedy delivery and reduction in risk can accelerate the pace of digital transformation. In this article, Michelle Sebek, Senior Product Marketing Manager at Progress discusses the role of DevSecOps in digital transformation and policy-based DevSecOps automation architecture.

Use cases for the future

Facing the Future: Emerging AI Facial Recognition


With new technologies like AI, opportunities have emerged to adopt facial recognition in a variety of different domains. Today, there are many success stories where AI has provided reliable and accurate face recognition technology. This article examines some of its potential use cases.

Evolving with threats

From DevOps to FieldOps: Going beyond Secure by Design

In this article, Mike Nelson is the VP of IoT Security at DigiCert, discusses Secure By Design and IoT security after DevOps. The IoT needs to be Secure By Design – it’s an oft-repeated and fundamental best practice for IoT security. However – it’s not enough. Secure By Design is a necessary but insufficient step to reach the goal of a secure IoT.

Interview with Aviad Mizrachi, CTO of Frontegg

“Plug-and-play user management allows companies to focus on their innovative tech”

Aviad Mizrachi, the co-founder and CTO of Frontegg, spoke with JAXenter about users changing expectations from modern applications and the challenges that developers face when bringing a product to market. He described Frontegg’s approach to unlocking innovation with its user management infrastructure and the efforts the company has taken to ensure a stellar Developer Experience. Aviad provided some tips for developers and users to prevent hacks and leaks, and offered some advice on finding the middle ground between simplicity and robustness.

Improving performance metrics

How GitOps Meant Fewer App Stalls and Failures for an Online Bank

This article examines GitOps in a real-world environment with issues and lessons on improving performance metrics for developers. GitOps provides an essential framework for DevSecOps, for security checks that extend throughout CI/CD, as well during the post-deployment stages of application management on Kubernetes clusters.

Profile: Hamida Rebaï Trabelsi, Senior Cloud Application Architect at Revenu Quebec

Women in Tech: “Learning is my way of having fun”

Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Hamida Rebaï Trabelsi, Senior Cloud Application Architect at Revenu Quebec.