days
0
-83
-3
hours
-2
0
minutes
-4
-9
seconds
-4
-4
search

#security

Securing the bricks and architecture

What can toy building blocks teach developers about security best practices?

Modern application development, when broken down, isn’t too dissimilar to using toy blocks to build a bridge. For example, to build a secure bridge, it is not sufficient to focus on each brick individually to determine if the bridge is strong enough. The builder must understand the bigger picture, or the ‘architecture.’

Interview with Yuval Hertzog, Co-Founder and Technology Head, Tide Foundation

“Human beings are cybersecurity’s weakest link”

What is “Cyber Herd Immunity” and “blind secret processing”? How does a decentralized system prevent vulnerabilities? We spoke with Yuval Hertzog, Co-Founder and Technology Head at the Tide Foundation about security-centric solutions, PRISM authentication, and more.

Interview with Chris Eng

“Proactive security scanning of code is a must”

We spoke to Chris Eng from Veracode about the UA-Parser-JS NPM Open Source library hack. What happened, what was the outcome, and what are unique open source security concerns? Chris Eng gives advice on how we can boost our open source security practices and avoid malicious code.

Interview with Brian Fox, CTO and Co-founder of Sonatype

“Organizations have to focus on smart security”

We’ve had a lot of questions about the state of organizational security lately. Brian Fox addressed our questions and concerns about making sure security and development go hand in hand. What cultural shifts need to happen to ensure that security is baked into every facet?

Interview with Jeff Williams, CTO and Co-founder at Contrast Security

“High-profile application attacks have continued and perhaps ramped up”

Jeff Williams, CTO and Co-founder at Contrast Security, answered our questions about application security, the newest executive order in the US, where vulnerabilities are most likely to occur, and more. Learn more about the Contrast platform and how it works to ensure software security.

Secure your greatest asset

Tips to Keep Your Data Safe from Increasing Cyberattacks

The increasing cyberattacks on businesses only mean that it is time to secure your company to keep data safe. With these tips provided, you can stay away from online threats that disrupt business operations. Preventing data breaches will definitely keep companies out of trouble.