DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • DevOps Onramp
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Identity and Access Management

Okta

Okta Adds Free Developer Edition to AppSec Service

Mike Vizard | April 9, 2021 | APIs, authentication, identity and access management, Okta
Okta this week lowered the barrier to adoption of DevSecOps best practices by making available an Okta Starter Developer Edition to enable developers to embed Okta authentication, authorization and user management capabilities ...
JumpCloud IoT privacy

JumpCloud Brings Zero-Touch Provisioning to the Mac

Mike Vizard | March 16, 2021 | Apple, Apple Mac, device provisioning, jumpcloud
JumpCloud today announced it is adding a zero-touch enrollment for Macs capability to its cloud directory platform that will also be extended over time to applications. Greg Keller, JumpCloud CTO, said this ...
Rewind code GitHub

Rewind Acquires BackHub to Protect GitHub Repositories

Mike Vizard | February 11, 2021 | code repositories, data security, github, Rewind
Rewind, a provider of a software-as-a-service (SaaS) platform for backing up cloud services, today announced it has acquired BackHub to gain control of a platform for backing up GitHub repositories. Based in ...
OAS OpenAPI

OpenAPI Specification: Perception vs. Reality

Roey Eliyahu | February 4, 2021 | API security, cyber security, OpenAPI, policy
The OpenAPI Specification (OAS) (formerly known as the Swagger specification) provides a way to describe and document REST APIs and their components. It includes details on endpoints, their operations, parameters needed for ...
network NetSecOps

DevSecOps Implementation: EDR/XDR

Don Macvittie | February 2, 2021 | DevSecOps adoption, EDR, security, XDR
We mentioned host intrusion detection and network intrusion detection in an earlier blog, and mentioned firewalls a couple of times in passing. Let’s delve a bit into the history to understand how ...
MDM

Quest Software Expands MDM Cloud Reach

Mike Vizard | March 3, 2020 | IT management, KACE Cloud, MDM, mobile device management
Quest Software today extended the reach of its mobile device management (MDM) service to provide more granular control over mobile devices and applications in addition to being able to track their location ...
Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management

Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management

Richard Diver | February 24, 2020 | IAM, identity and access management, Multi-cloud, multi-cloud adoption, security, zero-trust
This may well be the decade that the data center’s reign falls, and multi-clouds prevail. A multi-cloud strategy, which incorporates cloud services from multiple vendors, promises plenty of benefits, including improved resilience ...
password

5 Password Policies to Up Your Security

Greg Keller | February 17, 2020 | password policies, password security, passwords
Complex passwords can save users from being hacked—any IT admin will tell you that. Plus, countless studies and articles on password security have been published about why password policies are vital to ...
SSH keys

SSH Key Management and Your Organization

Rajat Bhargava | February 3, 2020 | identity management, key management system, servers, SSH keys
It always starts out the same way: a few machines, a few users and a few SSH keys to manage. You manually copy their keys (and your own) to the appropriate machines ...
Identity Management with ForgeRock's Peter Barker

DevOps Chat: Identity Management with ForgeRock’s Peter Barker

Alan Shimel | January 11, 2019 | devsecops, ForgeRock, IAM, identity management, security
Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people ...
DevOps and the Identity Conundrum

DevOps and the Identity Conundrum

Kristian Nelson | September 26, 2016 | enterprise devops, HR Management, Identity, Identity Definition, identity management, Identity Theft, QA, Role Consistency, Role Definition, Role Management, security
"Who am I?" It is perhaps the most basic question of consciousness. The answer could be subdivided by aspects of my life story … my career, my family, my beliefs, my education ...
Loading...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

10 steps to continuous performance testing in DevOps
Thursday, August 11, 2022 - 3:00 pm EDT
Bring Your Mission-Critical Data to Your Cloud Apps and Analytics
Tuesday, August 16, 2022 - 11:00 am EDT
Mistakes You Are Probably Making in Kubernetes
Tuesday, August 16, 2022 - 1:00 pm EDT

Latest from DevOps.com

CloudNativeDay: WASM to Drive Next IT Epoch
August 10, 2022 | Mike Vizard
MLOps Vs. DevOps: What’s the Difference?
August 10, 2022 | Gilad David Maayan
GitHub Brings 2FA to JavaScript Package Manager
August 9, 2022 | Mike Vizard
CREST Defines Quality Verification Standard for AppSec Testing
August 9, 2022 | Mike Vizard
IBM Unveils Simulation Tool for Attacking SCM Platforms
August 9, 2022 | Mike Vizard

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

The State of the CI/CD/ARA Market: Convergence
https://library.devops.com/the-state-of-the-ci/cd/ara-market

Most Read on DevOps.com

Recession! DevOps Hiring Freeze | Data Centers Suck (Power) ...
August 4, 2022 | Richi Jennings
Orgs Struggle to Get App Modernization Right
August 4, 2022 | Mike Vizard
GitHub Adds Tools to Simplify Management of Software Develop...
August 4, 2022 | Mike Vizard
The Everything-As-Code Revolution and the OWASP Top 10
August 4, 2022 | Aakash Shah
Putting the Security Into DevSecOps
August 5, 2022 | Ross Moore

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.