Facebook, Capital One, Marriot International – we’re so used to emails asking us to change our passwords because of a data breach that we barely bat an eyelid now. I’m not saying that we should stop changing our passwords, but what if massive data breaches became a thing of the past? Well Tide might just have a found a way to do that.
A recent report revealed that real time buying in the advertising industry does not comply with the set GDPR requirements. With so much concern about privacy, how can you protect your data? In this article, Katherine Barnett examines some of the ways you can keep your data safe and keep sensitive information out of advertisers’ hands.
It is critical than ever to have your systems and processes in place to protect your data as more and more companies are embracing digital technologies and cloud solution. Here the question arises, how? Stephanie Donahole has some interesting ideas!
No one wants to accidentally infect their system with a security vulnerability. Now, developers can safely dig into new software with the Sandboxed API. Newly open sourced by Google, this data security tool helps ensure the safety of your system while still letting developers put new programs through their paces.
Hunting for weak spots in Java and Python projects is easier than ever with SAP’s Vulnerability Assessment Tool
Does your Java project have a giant target hiding deep within its code? Thanks to the all-new Vulnerability Assessment Tool from SAP, developers can find, assess, and mitigate known security issues in their Java and Python apps.
Data breach headlines over the last 12 months hammer the point home that companies can no longer afford to treat data protection as an external add-on to their business. In this article, Chris Davis explores three key trends that frame how developers can help achieve new data protection objectives.
Upwork’s latest skills index has a bunch of surprises for the hungry freelance market. It’s time to brush off your Hadoop skills and revisit your science textbooks. We take a look at what skills you should highlight on your resume, from machine learning skills to data security certifications.
As containers have grown in popularity, so too has the understanding that we need to find solutions to keeping the code within them secure from vulnerabilities. In this article, Shiri Ivtsan gives some suggestions on how you can achieve that.
No one wants their organization to show up on the 6 o’clock news for a massive data breach. How can companies protect themselves from cybersecurity threats? Well, a recent study from Cisco shows that following the GDPR regulations has a tangible effect on improving data security.
The serverless trend is nowhere near its fading point. And one of the most important topics within the serverless universe is security. Serverless is not immune to security problems but our focus needs to shift particularly to the world of APIs where sensitive data is prominently transferred in these modern application designs.
Kubernetes has finally hit the worst milestone: their first major security flaw. This vulnerability allows any user to escalate their administrative privileges and attack any container running on the same pod. Even worse, there’s no simple way to tell if you’ve been affected.
How secure is open source software? This question has serious implications for enterprises looking to make a decision between an open source project or a commercial product. In this article, Vittorio Bertola lays out the advantages and disadvantages of each for data security.
Data security made headlines around the world with the GDPR earlier this year. But now, a recent initiative from some of the biggest names in tech makes it even easier to keep your data safe when moving it across providers with the Data Transfer Project.
The cloud offers so many advantages for DevOps, but it comes at a cost. In this article, John Martinez explains why security needs to be a priority for all DevOps teams.