DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DataOps
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
  • Media Kit
  • About
  • Sponsor
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DataOps
  • DevSecOps
  • DevOps Onramp
  • Platform Engineering
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps
    • ROELBOB

Traceable Microsite

Securing Open-Source Apps

Securing Open-Source Apps

Avatar photoLouis Vistola | September 3, 2021
Securing Open-Source Apps with API Scans and Observability Businesses building applications have always made great use of open-source software. The move to cloud-native applications, use of low code development, and embracement of ...
migration cloud trendsSnowflake Aryaka cloud security migration

Cloud Security Requires Shared Responsibility

Avatar photoRenata Budko | August 17, 2021 | AWS, Cloud Security, public cloud, Traceable
The Growth of Public Cloud and the Need for Cloud Security Since 2006 when Amazon first introduced EC2 — the first public cloud service — cloud has become a major staple of ...
no-code Hasura GraphQL microservices low-code security APIs

Securing Microservices Vs. Monolithic Apps

George Lawton | August 10, 2021 | API security, APIs, cloud-native, Traceable
New requirements for Securing Microservices Vs. Monolithic Apps Enterprises are migrating from monolithic applications to microservices, hoping to accelerate software deployment and improve scalability. Security is sometimes glossed over in these transitions ...
cloud infrastructure GitLab cloud service cloud-native OpenStack

Dependencies in Cloud-Native Apps can Amplify Risks

Avatar photoLouis Vistola | August 6, 2021 | app security, cloud-native apps, Traceable
Hidden Dependencies in Cloud-Native Apps can Amplify Security Risks Cloud-native applications and modern development practices result in applications that are highly distributed and loosely coupled. In many cases, organizations have no control ...
open source Shopify breach

The Shopify Breach: Why Authz Exploits Slip by Most Security Defenses

Avatar photoInon Shkedy | August 2, 2021 | Authz, breach analysis, Cybersecurity, Shopify, Traceable
What Happened As part of a bug bounty, the security researcher Uzsunny found a critical vulnerability on the Shopify platform. The vulnerability allowed the attacker to assign himself as a “collaborator” to ...
security engineers

Why Was Facebook Vulnerable to an Authentication Exploit?

Avatar photoInon Shkedy | July 30, 2021 | authentication, data breach, facebook, Traceable
What Happened: As part of a bug bounty program, the AppSecure cybersecurity research team found a vulnerability on the authentication mechanism of Facebook. It gave them the ability to potentially gain full ...
Uber SDM

The Uber API Authorization Vulnerability

Avatar photoInon Shkedy | July 23, 2021 | APIs, breach, breach analysis, Traceable, Uber
What Happened In September 2019, a critical bug was discovered on Uber API, which allows merchants, service providers and others to offer ride-sharing services to customers. Uber had exposed a vulnerable application programming interface ...
Standardization

Web Application Firewalls Aren’t Protecting Cloud-Native Apps

Avatar photoRoshan Piyush | July 14, 2021 | ai, machine learning, Traceable, web application, Web Application Firewall
Your web application firewall (WAF) is humming at the edges of your network, faithfully blocking malicious attacks before they can do any harm. Better yet, it’s a next-generation WAF (NG-WAF). It consists ...
Node.js ZAP SBOM

The New Norm for Modern Apps: Security Observability

Avatar photoLouis Vistola | July 7, 2021 | automation, cyberattack, machine learning, modern applications, observability, security observability, Traceable
Observability has burst onto the scene across all types of operational and security-focused activities. Its need is being driven by increased demands for businesses to be more responsive to changes and more ...
Observability - IBM - GitLab - APM - application performance - Instant

TraceAI : Machine Learning Driven App and API Security

Avatar photoSanjay Nagaraj | June 28, 2021 | API security, devsecops, machine learning, observability, Traceable
API security Modern applications are mobile first and are built around cloud-native distributed microservices architectures. These architectures have become the basic building blocks for complex and reliable distributed web and mobile applications ...
Safeguarding Composable Architecture Applications Based on API-enabled Components

Safeguarding Composable Architecture Applications Based on API-enabled Components

Avatar photoLouis Vistola | June 17, 2021 | API security, application development, composable apps, composable architecture, Traceable
The use of composable methodologies for application development is growing rapidly. The reason: It offers many benefits that speed the development process and opens up application creation to developers of all skill ...
TypeScript RASP

What Runtime Application Self-Protection (RASP) Doesn’t Solve

Avatar photoRoshan Piyush | June 9, 2021 | application security, RASP, runtime security, Traceable
RASP, or Runtime Application Self-Protection, is a modern security technology that protects web applications from attacks during runtime. The technology is an important complement to defense systems that focus on the perimeter, ...
Show More Loading...

Traceable Demo

White Papers

Webinars

Traceable Podcast

  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2023 ·Techstrong Group, Inc.All rights reserved.