days
0
-18
-5
hours
-1
-6
minutes
-2
-2
seconds
-1
-4
search

#security

Baked in security

Five security principles developers must follow

The stakes are higher. Security must be the number one priority. Agile, MicroServices and DevOps are all disciplines that have worked hard to increase the rate at which software can adapt to changing business requirements. How do we bake security into the mix so we don’t end up adding it badly in a rush at the end? The answer is DevSecOps.

Watch Maximiliane Zirm's DevOpsCon session

How practical is “DevSecOps” really? – A field report

DevSecOps isn’t always about success. Senior IT Security Consultant at mgm security partners, Maximiliane Zirm shares the successes, mistakes, and lessons learned in the area of DevSecOps during a large project What’s the verdict: Just how practical is DevSecOps? Find out in this field report from DevOpsCon.

Keeping up with Java

How Java’s security methods have changed in 20 years

Over the course of its 20-year history, it is clear that Java’s success, and security, has developed due to its continual reinvention, adaptation, and evolution through the works of its community. This article will explore some key innovations and milestones in Java’s history, and explain how they connect with its continued efforts to remain secure through its lifespan.

Securing open source secrets

How security keeps up when developers drive open source

Over the past thirty years, the shift from proprietary, to freemium, to open source software has changed decision-making within companies. Now, the bottom-up decision-making models are commonplace, but often security teams are left on the outside looking in. This article examines four use cases to empower developers with open source secrets management.

Dispatch has been dispatched

Netflix releases Dispatch for crisis management orchestration

Is your organization prepared for security incidents? Dispatch has come to the rescue. The orchestration framework was developed by Netflix and recently released open source. It integrates with popular tools like Jira, Slack and GSuite to help you manage and keep track of incidents.

Best security practices

How To Securely Program in Java in 2020

In this article, we’ll take a look at five principles that should be followed when coding in Java in 2020. Ideally, these principles should be integrated into a DevSecOps process, in which security is built into development from the ground up, but they are equally useful for auditing legacy code.

SDL + SDLC = Secure SDLC

Proactive security engineering

Secure Software Development Lifecycle (Secure SDLC) is a key focus area for product engineering organizations. Adopting security as a part of the development process to reduce the risk of vulnerabilities and threats, leads to reduced security incidents and damages. This article presents an uncomplicated view of Secure SDLC for practitioners – Engineering leaders, Product Managers, and Process Leads.

Security starts early

The view of quantum threats – from the front lines

Quantum computing might initially sound like a far-fetched futuristic idea, but companies such as Amazon, Google, and IBM are putting their weight behind it and preparations have begun. With quantum computing potentially within our reach, what will happen to our current security models and modern-day encryption? See what security experts are doing to prepare for quantum threats.

Evolving security threats

Cybersecurity trends for 2020

Keeping your data and identity secure is more important than ever in 2020, and as tech evolves, it has also become more complicated than ever. How will cybersecurity evolve? Phishing isn’t just limited to email anymore, and your car’s built-in tech might become the source of data theft. Keep yourself secure and learn about what security experts think is yet to come.

Responding to cyberthreats

Modern Warfare: Cybersecurity on the Battlefield

Cybersecurity doesn’t just apply to your personal devices, it also is one of the biggest roles in modern warfare and cannot be ignored. Cyberwarfare is far from a theoretical threat. History has shown that the value of gaining access to privileged information and disrupting systems for political gain is more than enough motive to generate action from independent hacktivists, nation-states, and private organizations.