Please turn on your JavaScript for this page to function normally.
Broken glass
Proliferation of vulnerable open source components creates growing risk

The continued and persistent use of components in software development is creating systemic risk in our digital infrastructure. A new Veracode report also found that companies …

Binary
68% of organizations don’t have an IoT test strategy

Capgemini and HPE examined the state of application quality and testing practices across multiple industries and 32 countries. They discovered that, despite 85% claiming that …

Qualys
Bringing security into IT and application infrastructures

In this podcast recorded at Black Hat USA 2016, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about a new trend in bringing security into IT …

collaboration
Keys to successful security vendor collaboration

The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

building blocks
Top 10 technologies for information security and their implications

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …

O'Reilly DevOpsSec
Review: DevOpsSec

About the author Jim Bird, CTO of a major US-based institutional alternative trading system, has more than 20 years of experience in financial services technology, including …

lock
Strengthen security during production and development

Applications have become the heart of many businesses, with millions of dollars allocated to their development and millions of dollars in revenue associated with their …

professional
Companies are hungry for professional open source talent

Recruiting open source talent is a top priority for hiring managers focused on recruiting technology talent, and recruiters are increasingly looking for more professional …

Connect
How do you ensure success with DevOps?

Only 20 percent of organizations that have attempted to implement DevOps have fully deployed it, according to CA Technologies. Research also found that these …

Don't miss

Cybersecurity news