The difficulties of handling secrets

The last mile of sensitive data

The difficulties with handling secrets and access details can lead to three major issues for developers: leaks and breaches, secret sprawl, and unproductiveness. This article takes a look at each of these issues and how you can block attacks on your processes and personal workstations.

Interview with Brian Fox, CTO and Cofounder of Sonatype, Jyoti Bansal, CEO of Traceable and Harness, Jeff Hudson, CEO of Venafi

SolarWinds hack and security – What is a software bill of materials?

We spoke with Jyoti Bansal, CEO of Traceable and Harness, Brian Fox, CTO and Cofounder of Sonatype, and Jeff Hudson, CEO of Venafi about the SolarWinds hack and cybersecurity. Learn about the security behind a software bill of materials, and what developers can do to protect themselves from cyberattacks.

DevSecOps: Creating promises for integrating security with DevOps

Why Security Needs to Be Integral to DevOps

Through DevSecOps, the traditional security engagement turns into proactive security measures integrated within the software development life cycle (SDLC). Thanks to this evolved approach, both continuous integration (CI) and continuous delivery (CD) approaches facilitate continuous testing and evaluation of the software code all through the development process.

Gold standard of cybersecurity

Getting “Passwordless” right: 7 mistakes you should avoid

The future is passwordless – at least that is what current market developments speak for. Even better digital identities and available biometric technology facilitate secure access to online services without the need for cryptic strings. But there are several pitfalls on the way to a passwordless infrastructure. Guest author Al Lakhani shows what to avoid.

Twelve experts offer their thoughts on data privacy in 2021

Data Privacy Day 2021: Industry experts discuss the state of play

After one of the most tumultuous years in recent history, it’s necessary that we take the time to consider what data privacy means in the new context we find ourselves in. With more consumers relying on online services to do everything from their weekly shop to socializing, and more businesses migrating operations into the cloud to support working from home, it’s clear that the integrity of data is more important now than it ever has been.

Baked in security

Five security principles developers must follow

The stakes are higher. Security must be the number one priority. Agile, MicroServices and DevOps are all disciplines that have worked hard to increase the rate at which software can adapt to changing business requirements. How do we bake security into the mix so we don’t end up adding it badly in a rush at the end? The answer is DevSecOps.