Please turn on your JavaScript for this page to function normally.
DevOps
With increased DevOps adoption, roles in software development teams are changing

Roles across software development teams have changed as more teams adopt DevOps, according to GitLab. The survey of over 3,650 respondents from 21 countries worldwide found …

mobile code
Technologies in all layers of the cloud stack are at risk

As breaches and hacks continue, and new vulnerabilities are uncovered, secure coding is being recognized as an increasingly important security concept — and not just for …

DevOps
Financial services leading the way in adopting DevOps, still hurdles remain

Businesses in financial services are ahead of the government sector in adopting DevOps to increase their speed of development and free up developer time, but hurdles still …

application
Keeping your app’s secrets secret

The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have …

cloud
You have to consider cybersecurity at all points of a cloud migration

Human error and complex cloud deployments open the door to a wide range of cyber threats, according to Trend Micro. Cloud security issues Gartner predicts that by 2021, over …

code
Happy developers more likely to build secure apps

There’s an intrinsic link between developer happiness and application security hygiene, and an alarming level of application breaches, according to Sonatype. For the …

Code
Best practices and challenges in adopting continuous software testing

Businesses must accelerate the shift to comprehensive continuous software testing in order to remain competitive, according to a report released by Capgemini and Broadcom. The …

Security Compass
Automate manual security, risk, and compliance processes in software development

The future of business relies on being digital – but all software deployed needs to be secure and protect privacy. Yet, responsible cybersecurity gets in the way of what any …

Hand
What is driving the machine identity crisis?

Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of …

Network
Interconnectivity and networking predictions for 2020 and beyond

Traditional networking and interconnectivity approaches are not handling the pressures being placed on traditional computer networking, according to Stateless. The challenges …

DevOps
How industries are evolving their DevOps and security practices

There’s significant variation in DevOps maturation and security integration across the financial services, government, retail, telecom, and technology industries, …

container
Container security requires continuous security in new DevSecOps models

When Jordan Liggitt at Google posted details of a serious Kubernetes vulnerability in November 2018, it was a wake-up call for security teams ignoring the risks that came with …

Don't miss

Cybersecurity news