Technically speaking, Blockchain has revolutionized the cybersecurity process and has considerably made it harder for cyber terrorists to tamper with critical data. In this article, Maria Thomas explores two major functions of Blockchain technology that aid cybersecurity.
Open source has a lot of benefits, no one can argue that. However, it is also uniquely positioned to face the threats of today’s security concerns. We talked with Rami Sass, CEO and co-founder of WhiteSource about some of the potential pitfalls in open source components, its challenges and more.
Google has released Asylo: an open-source framework that uses enclaves for maximum security. Aslyo makes it easy to ensure confidentiality and comes full of exciting features.
There’s no slowing down the growing Internet of Things. However, security concerns are becoming an unavoidable problem for consumers. Mike Nelson, VP of IoT Security, DigiCert shares his wisdom about IoT security and fighting back with Public Key Infrastructure.
What would happen if someone hacks your alarm clock? As the Internet of Things grows, security concerns grow with it. How can you keep all of your internet connected devices safe and secure? Roman Patel shares some safety concerns about the growing infrastructure in our tech-oriented lives.
PolySwarm aims to incentivize a global community of security experts to disrupt the $8.5 billion cyber threat intelligence industry. In this article, Paul Makowski, CTO and co-founder of Swarm Technologies, explains how this works and how you can earn cryptocurrency for detecting malware.
Should you pay more attention to security when drafting your DevOps approach? Our experts think that security should be included in the initial development along with all other concerns about how the software should perform. We invited six JAX DevOps speakers to weigh in on the importance of security in a DevOps context, companies’ move to the cloud and how/if this trend will continue to grow in 2018.
It’s been less than a month since the Spectre and Meltdown debacle but apparently, it’s time for a new flaw to dominate the news. The critical vulnerability lies in Electron — the team deployed a patch for the vulnerability and they ask you to update your apps to the latest stable version immediately.
The Meltdown and Spectre story continues. Even though Amazon Web Services’ (AWS) response shows that they’ve already patched and protected their infrastructure you still have work to do. AWS’ Shared Responsibility Model means that you are responsible for patching the operating system running on your EC2 instances, and this is where things get … complicated.
Meltdown and Spectre affect nearly everything that’s got a chip in them. But somehow single-board computers like the Raspberry Pi have managed to avoid this vulnerability. How?
What does the future of DevOps look like? We asked Mark Pundsack, Head of Product at GitLab about his predictions for 2018. Expect to hear lots about DevSecOps, Kubernetes, containers, and more.
Organizations in 2018 will have greater capabilities to decentralize information need, through both blockchain- and non-blockchain-based solutions. In this article, Joe Stuntz, Vice President of Cybersecurity at One World Identity (OWI) gives his digital privacy and security predictions.
Security is one of the core issues when creating a production environment. Particularly when using the Docker ecosystem in general and Docker Swarm in particular, the question arises of how to secure the development process. In his session at the DevOpsCon 2017 in Berlin, Gianluca Arbezzano, software engineer at InfluxData, gives important tips on setting up a production environment, immutability, and security concepts for dockers.
Agile development is great for a lot of things. However, it’s important to remember security issues in the development process. In this article, Jessica Cyrus goes over the best ways to make sure security concerns are adressed properly in the Agile development process.