DevSecOps: Build a bridge between fast and secure software development
Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …
Qualys Container Security: Discover, track, and secure containers
Qualys announced a new solution that extends its single-pane visibility and continuous security to the new and growing virtualization environment of Docker containers, and …
Weak DevOps cryptographic policies increase financial services cyber risk
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …
Cryptographic security risks are amplified in DevOps settings
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications, …
Software development teams embrace DevSecOps automation
Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps …
DevSecOps: Building continuous security into IT and app infrastructures
In this podcast recorded at RSA Conference 2017, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about DevSecOps. Instead of making security a …
CA Technologies acquires Veracode for $614 million
CA Technologies has signed a definitive agreement to acquire Veracode for approximately $614 million in cash. The transaction is expected to close in the first quarter of …
The agile IT stack grows and becomes more complex
BigPanda’s annual survey evaluated the current IT monitoring landscape, including a review of the most popular tools for monitoring, deployment, and ticketing/collaboration; …
Scale, frequency and causes of certificate-related outages
Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and …
The rewards of advanced agile and DevOps adoption
In today’s fiercely competitive environment for customer satisfaction and brand loyalty, agile and DevOps are driving happier customers and employees. Results from a new CA …
How the application landscape is impacting IT organizations
Accelerating cloud adoption is creating increased demand for security application services including WAF, DNSSEC, and DDoS protection, according to F5 Networks. As an increase …
What developers and managers are saying about application security challenges
Despite showing moves toward earlier and more frequent security testing throughout the development process, there are still hurdles development and security teams must …
Featured news
Sponsored
Don't miss
- Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
- CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)
- The rising influence of AI on the 2024 US election
- 10 colleges and universities shaping the future of cybersecurity education
- What is multi-factor authentication (MFA), and why is it important?