No one wants to accidentally infect their system with a security vulnerability. Now, developers can safely dig into new software with the Sandboxed API. Newly open sourced by Google, this data security tool helps ensure the safety of your system while still letting developers put new programs through their paces.
Hunting for weak spots in Java and Python projects is easier than ever with SAP’s Vulnerability Assessment Tool
Does your Java project have a giant target hiding deep within its code? Thanks to the all-new Vulnerability Assessment Tool from SAP, developers can find, assess, and mitigate known security issues in their Java and Python apps.
Data breach headlines over the last 12 months hammer the point home that companies can no longer afford to treat data protection as an external add-on to their business. In this article, Chris Davis explores three key trends that frame how developers can help achieve new data protection objectives.
Upwork’s latest skills index has a bunch of surprises for the hungry freelance market. It’s time to brush off your Hadoop skills and revisit your science textbooks. We take a look at what skills you should highlight on your resume, from machine learning skills to data security certifications.
As containers have grown in popularity, so too has the understanding that we need to find solutions to keeping the code within them secure from vulnerabilities. In this article, Shiri Ivtsan gives some suggestions on how you can achieve that.
No one wants their organization to show up on the 6 o’clock news for a massive data breach. How can companies protect themselves from cybersecurity threats? Well, a recent study from Cisco shows that following the GDPR regulations has a tangible effect on improving data security.
The serverless trend is nowhere near its fading point. And one of the most important topics within the serverless universe is security. Serverless is not immune to security problems but our focus needs to shift particularly to the world of APIs where sensitive data is prominently transferred in these modern application designs.
Kubernetes has finally hit the worst milestone: their first major security flaw. This vulnerability allows any user to escalate their administrative privileges and attack any container running on the same pod. Even worse, there’s no simple way to tell if you’ve been affected.
How secure is open source software? This question has serious implications for enterprises looking to make a decision between an open source project or a commercial product. In this article, Vittorio Bertola lays out the advantages and disadvantages of each for data security.
Data security made headlines around the world with the GDPR earlier this year. But now, a recent initiative from some of the biggest names in tech makes it even easier to keep your data safe when moving it across providers with the Data Transfer Project.
The cloud offers so many advantages for DevOps, but it comes at a cost. In this article, John Martinez explains why security needs to be a priority for all DevOps teams.
With all the security breaches and misuses of private information in the news, data security is more important than ever for businesses. But are you legally liable? Brenda Berg explains why your business needs to start thinking about data privacy and cyber liability.
DevSecOps isn’t easy to get right, but it’s becoming more and more important. We go over the challenges, key insights, and Gartner’s top 10 things any company needs to remember if they want to integrate security into DevOps.
The IOUG survey covered 381 members, who oversee complex and multiple databases. Most respondents have already virtualized their servers are now planning database virtualization.