days
0
-75
-2
hours
-1
-6
minutes
-3
-9
seconds
-4
-2
search

#security

What it means for existing software dependent on IE

The Death of Internet Explorer

Internet Explorer (IE) will be officially retired on June 15, 2022. Microsoft will altogether stop supporting and updating the pioneering web browser. As IE winds down, the question becomes, how does this affect businesses and existing software, and what will its full impact be?

Interview with Stephen Magill, VP of Product Innovation at Sonatype

“Sonatype Lift was designed to intuitively blend into developer workflows”

What is Sonatype Lift and how can it help enhance security? We had a chat with Stephen Magill about how Sonatype Lift can help bring security beyond silos. Stephen also shares some security tips, how false positives affect cybersecurity, and where the biggest security threats lie in organizations.

Looking ahead around observability

Observability and security – where are the crossover points?

Gartner has predicted more than 75 percent of global organizations will be running containerised applications in production by 2022. With so many more moving parts to look at, developers have to automate how they gather data on their infrastructure components, while security teams have to understand the new models for applications too.

Building trust

Culture is the secret sauce for ethical data management

Data privacy regulations are relatively new and not well understood within an organization. With that context, the way organizations should approach data privacy isn’t only about compliance with regulations; it’s also the right thing to do to build trust with their customers. How do you introduce privacy and trust as part of your culture?

Accelerate your security efforts

Addressing software security for financial services in 2021

While financial services organisations have historically been strong when it comes to employing application security testing tools, more can be done to accelerate efforts and make these continuous. So what specific steps can be taken by companies in this space to address security in the software they create for the remainder of 2021, and how will this benefit them long term?

Interview with Jeff Williams, CTO and Co-founder at Contrast Security

“Observability is critical to security”

Jeff Williams, CTO and Co-founder at Contrast Security, spoke to us about the newest State of Application Security in Financial Services Report. Read his insights on the importance of observability, how false positives affect security, and the best practices we should all take.

Improve your security know-how

4 Common Software Security Development Issues & How to Fix Them

As software has become the backbone of modern business, cyberattacks have become an ever-present threat, making application security a critical necessity to ensure business continuity. This article examines four commonly found software security development issues and how to address them.

Interview with Kevin Bocek, Venafi

“The impact of poor machine identity management can be devastating”

Kevin Bocek discussed security with us, including the impact of a successful software supply chain attack, what security best practices we should all follow, and the difference between human and machine identity. Kevin shares his knowledge from over 16 years of experience in IT security.

Achieving high-level security

Enhance your secrets management strategy with Puppet + HashiCorp Vault

Securing sensitive data (called “secrets”) — such as passwords, machine credentials, and API keys — is not always simple to manage manually, especially at an enterprise scale. This article explores the importance of secrets management, and how Puppet and HashiCorp Vault adds an extra layer of protection as you continue to build out your cybersecurity strategy.

Interview with Steve Wilson, Chief Product Officer at Contrast Security

“Contrast Scan revolutionizes static application security testing”

Contrast Security announced Contrast Scan, a new tool that will help teams improve team’s security by quickly finding and identifying vulnerabilities and insecure code. We spoke with Steve Wilson, Chief Product Officer at Contrast Security about the release and security best practices.