IT Security

Live Fireside Chat with Christopher Krebs: How to Combat Disinformation

We live in a digital world where most information is now found online. This makes it increasingly difficult to verify…

5 days ago

Solving Cloud-Native Challenges in the Rush to the Cloud

The shift to cloud-native environments away from traditional data center infrastructures continues unabated, but security and complexity challenges remain a…

3 weeks ago

4 Ways SASE Fuels DevOps Productivity

Many enterprises are adopting secure access service edge (SASE) solutions as part of their digital transformation efforts. SASE, in a…

3 weeks ago

Torvalds’ Bug Warning is a Lesson for Linux Users

Linux does, occasionally, raise security concerns. While many users see it as the most secure, robust and versatile operating system…

4 weeks ago

How To Address DevSecOps Skills Shortages

"If it's scarce, it drives the price up," said McAfee director of systems engineering Sahba Idelkhani. And DevSecOps talent is…

1 month ago

42Crunch API Security Platform Now Available On-Premises

42Crunch has announced that the scanning tools it provides to enable DevOps teams to secure application programming interfaces (APIs) can…

1 month ago

Solvo Automatically Crafts Cloud Security Policies

Solvo today announced general availability of a namesake tool that automatically creates a least-privilege policy and applies it to application…

1 month ago

How to Mitigate Low-Code Security Risks

Gartner predicts that by the end of 2025, over 65% of development projects will use low-code builders. The field of…

1 month ago

Without These 3 Things, You Don’t Have DevSecOps

DevSecOps adds security to the DevOps software development and releasing paradigm. Everyone thinks this is a great idea, except actual…

2 months ago

Tackling Audit Compliance as Code

Do the words, “It’s audit time!” make your stomach sink? If so, you’re not alone. Assisting with evidence collection for…

2 months ago