DevSecOps
DevSecOps: Realities of Policy Management
Policy management is essential to scale cloud environments and is key to secure DevOps practices. It enables organizations to manage policies put in place that secure the cloud environment, ensure Kubernetes configurations ...
Twitter/Bluesky ADX Algorithm | Cloud Energy Use ‘Tripled’ | Apple Staff are Revolting
In this week’s The Long View: Bluesky—Twitter’s research spinout—opens its ADX algorithm, Irish data-center electricity worries grow, and Apple employees are the latest to rise up against hybrid working ...
Synopsys Sets Course After Agreeing to Acquire WhiteHat Security
Synopsys, Inc. plans to add dynamic application security testing (DAST) tools to its software-as-a-service (SaaS) platform in the wake of agreeing to acquire WhiteHat Security from NTT Security Corp. for approximately $330 ...
Self-Service Helps Devs Solve Cloud Security and Compliance
Organizations that need compliance must follow a growing number of security standards—PCI, HIPAA, SOC 2 and GDPR just to name a few. Every new standard gives rise to an exhaustive list of ...
Datadog Unfurls Application Security Service
Datadog, Inc. today made generally available an Application Security Monitoring (ASM) service that is based on the same agent software that many DevOps teams already use to monitor applications. Pierre Betouin, vice ...
What Should Elon Musk Do? | Passwordless Future: Tense | WebKit iOS Monopoly Ends?
In this week’s The Long View: Everyone has Twitter advice for Elon Musk, passwordless vision is vacuous, and Apple prevented from forcing Safari ...
Report Finds Most Log4Shell Vulnerabilities Unpatched
A report published today by Rezilion, a provider of a platform for tracking and analyzing software vulnerabilities, found that despite all the attention the Java zero-day Log4Shell vulnerability attracted, it appears that ...
Defining the Next Cycle of Technology
We’re in the middle of what we at ScyllaDB dubbed The Next Tech Cycle. Not “The World of Tomorrow” nor “The Shape of Things to Come” nor “The Wave of the Future”—because ...
MDR for DevSecOps: How Managed Security Can Help You Shift Left
What is managed detection and response (MDR)? Managed detection and response (MDR) is an outsourced service that helps organizations detect threats on endpoints, respond to them and carry out proactive threat hunting ...
Optimizing Security in Data Collection Processes
How you collect and process your data has a direct impact on the security of that data. By following best practices for data collection and processing, DevOps professionals can minimize the risk ...
Shift Left is Only Part of Secure Software Delivery
We’re living in the age of accelerated consumption and delivery. You can get a seemingly infinite selection of products delivered to your door within two days, for free, from thousands of miles ...
Blast Radius of GitHub Breach Major Security Concern
The extent to which software supply chains may be compromised in the wake of a security breach disclosed by GitHub may include thousands of organizations. GitHub has revealed that unauthorized parties compromised ...