search

#security

Security is a process, not a product

Good coding practices mean good data security

Data breaches are a dime a dozen these days. Are hackers getting better? Not really. It turns out that bad coding practices lead to insecure code and glaring vulnerabilities. Who knew?

The cloud is not failsafe

Protect your data from unexpected cloud failure

The cloud is one of the safest places to store your data. Even if business leaders find it more practical to store information locally, there are many reasons to leave the storage up to the cloud provider. The cloud, however, is not failsafe.

Interview with Mitchell Hashimoto, founder of HashiCorp

“It’s safe now to move to the cloud” | DevOpsCon

More and more companies are now choosing to migrate their services to the cloud. JAXenter editor Gabriela Motroc talked to Mitchell Hashimoto, founder of HashiCorp and DevOpsCon speaker, about why it’s safe now to move to the cloud and what precautionary measures should be taken before diving into the cloud.

Cloud, Internet of Things and a whole array of prognoses for security

7 Security Predictions: The whole world wants in on cybercrime!

2016 has a lot in store for us if you ask Christophe Birkeland, the CTO of Malware Analysis at BlueCoat Systems. Some are constructive, others are destructive but they all represent the reality that surrounds us and they all have a part to play this year.

Get your free copy now!

The new JAX Magazine – OSGi, Angular 2, microservices and more

2016 has just begun and it is already bombarding up with promises of a sunnier IoT perspective and a heftier collection of tips and tricks to facilitate developers’ performance. This JAX Magazine issue is packed with proof that OSGi is regaining momentum and other concepts that have one purpose and one purpose only: to curtail unproductive operations -it’s our treat!

How to build a secure system from scratch

Docker and Security: How do they fit together?

While Docker images are famously simple and practical, Docker security remains a tricky maze. Docker pros Dustin Huptas and Andreas Schmidt show us the essential security features you need to know for building a secure system with Docker.

Debunking common vendor security claims

Myths and realities behind security analytics

Security software vendors tend to exaggerate the potential of their tools – to put it mildy. Using real-world attack examples, Niara’s Karthik Krishnan explains why so many enterprise systems are being breached and what cyber security technology is really capable of.

Establishing a BYOD strategy

The impact of BYOD on the enterprise

Many enterprise IT organisations experienced the rapid introduction of mobile and cloud within their environments. New challenges such as BYOD and the Internet of Things (IoT) brought about new demands and a rapid pace driving enterprises to simplify and retool IT infrastructure.