The Equifax hack that exposed nearly half of all Americans is going to happen again. It’s only a matter of time. And it’s all because developers are too busy to deal with pull requests.
How do we keep our code and ourselves safe? In this interview, Jeff Williams, co-founder and chief technology officer at Contrast Security explains why we have to reinvent security, why DevSecOps is so important, and how to avoid taking serious risks in applications.
Data breaches are a dime a dozen these days. Are hackers getting better? Not really. It turns out that bad coding practices lead to insecure code and glaring vulnerabilities. Who knew?
The cloud is one of the safest places to store your data. Even if business leaders find it more practical to store information locally, there are many reasons to leave the storage up to the cloud provider. The cloud, however, is not failsafe.
More and more companies are now choosing to migrate their services to the cloud. JAXenter editor Gabriela Motroc talked to Mitchell Hashimoto, founder of HashiCorp and DevOpsCon speaker, about why it’s safe now to move to the cloud and what precautionary measures should be taken before diving into the cloud.
2016 has a lot in store for us if you ask Christophe Birkeland, the CTO of Malware Analysis at BlueCoat Systems. Some are constructive, others are destructive but they all represent the reality that surrounds us and they all have a part to play this year.
Google will now block search results across all of its domains if a search occurs within Europe, in response to discussions with European Union regulators. The right to be be forgotten allows Europeans to demand search engines to delist particular links from the collection of search results generated by a search query for their name.
The U.S. Department of Defense is inviting vetted hackers to “Hack the Pentagon” in an unprecedented effort to test its digital security in the first ever federal government bug bounty, U.S. Secretary of Defense Ash Carter announced in a Facebook post.
2016 has just begun and it is already bombarding up with promises of a sunnier IoT perspective and a heftier collection of tips and tricks to facilitate developers’ performance. This JAX Magazine issue is packed with proof that OSGi is regaining momentum and other concepts that have one purpose and one purpose only: to curtail unproductive operations -it’s our treat!
While Docker images are famously simple and practical, Docker security remains a tricky maze. Docker pros Dustin Huptas and Andreas Schmidt show us the essential security features you need to know for building a secure system with Docker.
Software’s decision-makers are finding themselves increasingly involved in the debate over online resources for jihadist terrorism, as western political leaders call for more responsibility from tech innovators in the struggle against the Islamic State.
Security software vendors tend to exaggerate the potential of their tools – to put it mildy. Using real-world attack examples, Niara’s Karthik Krishnan explains why so many enterprise systems are being breached and what cyber security technology is really capable of.
Many enterprise IT organisations experienced the rapid introduction of mobile and cloud within their environments. New challenges such as BYOD and the Internet of Things (IoT) brought about new demands and a rapid pace driving enterprises to simplify and retool IT infrastructure.
A number of organisations have started publicly lobbying US Congress to take action over cybersecurity legislation, with Oracle, Microsoft, Apple and others accused of being on the wrong side of history when its comes to surveillance and users’ privacy.