Were you affected by the runC container breakout? Make sure your containers are all patched up and running safely and securely. When it comes to using containers, ensuring security should be everyone’s number one priority. What makes container vulnerabilities so dangerous?
Why do gaps keep appearing year after year? While the reason behind this is rather simple, the solution isn’t. In this article, Dr. Ratinder Paul Singh Ahuja makes an assessment of the security breaches and discusses what security will need in the future in order to deal with an ever-evolving infrastructure.
Despite the high quality of supportive tools in the field of security testing, this is still unknown territory for many development projects and therefore still has some unused potential. Christian Schneider’s session at DevOpsCon 2017 offers a well-rounded overview of the open-source tools used by security professionals and penetration testers in their daily work on the detection of security vulnerabilities.
Data Theorem recently launched two new API security products: API Discover, which helps enterprises combat what has been known as Shadow APIs, rogue APIs developers publish without proper enterprise security vetting that go undetected by today’s legacy security tools and API Inspect solution, which provides a continuous and automated security verification service to ensure the real-world operations of APIs always match their intended specs. We talked to Doug Dooley, Data Theorem COO about all this and more.
“The GDPR fever opened a greatly beneficial discussion on privacy protection – before that, nobody cared!”
Earlier this month, we reviewed the research of Vladimír Smitka on open .git folders in websites globally. The results of his research were remarkable – 390,000 web pages were found with open .git directory! So we invited Vladimir for a talk on his research, GDPR implications and his views on open source vulnerabilities.
In the world of DevOps, traditional application security is no longer enough. How can we improve AppSec? What are the newest security challenges that arise as DevOps becomes more mature? JAXenter editor Gabriela Motroc caught up with Tim Mackey, technical evangelist for Black Duck by Synopsys at DevOpsCon 2018 to talk about all this and more.
What are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what can you do to prevent them? Marcell Gogan answers these questions and more.
Technically speaking, Blockchain has revolutionized the cybersecurity process and has considerably made it harder for cyber terrorists to tamper with critical data. In this article, Maria Thomas explores two major functions of Blockchain technology that aid cybersecurity.
Open source has a lot of benefits, no one can argue that. However, it is also uniquely positioned to face the threats of today’s security concerns. We talked with Rami Sass, CEO and co-founder of WhiteSource about some of the potential pitfalls in open source components, its challenges and more.
Google has released Asylo: an open-source framework that uses enclaves for maximum security. Aslyo makes it easy to ensure confidentiality and comes full of exciting features.
There’s no slowing down the growing Internet of Things. However, security concerns are becoming an unavoidable problem for consumers. Mike Nelson, VP of IoT Security, DigiCert shares his wisdom about IoT security and fighting back with Public Key Infrastructure.
What would happen if someone hacks your alarm clock? As the Internet of Things grows, security concerns grow with it. How can you keep all of your internet connected devices safe and secure? Roman Patel shares some safety concerns about the growing infrastructure in our tech-oriented lives.
PolySwarm aims to incentivize a global community of security experts to disrupt the $8.5 billion cyber threat intelligence industry. In this article, Paul Makowski, CTO and co-founder of Swarm Technologies, explains how this works and how you can earn cryptocurrency for detecting malware.
Should you pay more attention to security when drafting your DevOps approach? Our experts think that security should be included in the initial development along with all other concerns about how the software should perform. We invited six JAX DevOps speakers to weigh in on the importance of security in a DevOps context, companies’ move to the cloud and how/if this trend will continue to grow in 2018.