DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More Topics
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Tag: cyberattack

Checkmarx Sonatype WhiteSource the secure software development

Checkmarx Report Highlights Need for AppSec Collaboration

Mike Vizard | May 9, 2022 | Checkmarx, cyberattack, malicious code, Python, Ruby
A research report published by Checkmarx finds the same basic malicious software developed using multiple programming languages as cyberattackers industrialize their malware development processes. Checkmarx, a provider of code scanning tools, shared ...
SBOM

The New Norm for Modern Apps: Security Observability

Louis Vistola | July 7, 2021 | automation, cyberattack, machine learning, modern applications, observability, security observability, Traceable
Observability has burst onto the scene across all types of operational and security-focused activities. Its need is being driven by increased demands for businesses to be more responsive to changes and more ...
observability cloud managed services Cosmonic Datadog incident response HashiCorp SAP

Best Practices for Cloud Incident Response

Gilad David Maayan | June 29, 2021 | cloud, cyberattack, Cybersecurity, incident management, incident response
Cloud computing is now mainstream, with almost all organizations running at least some resources in the public cloud—whether software-as-a-service (SaaS), platform-as-a-service (PaaS) or infrastructure-as-a-service (IaaS). Security teams have been scrambling to adapt ...
Cybersecurity 2021: The New Normal Virtual Summit - DevSecOps - Identity Access Management - AppSec

Cybersecurity 2021: Are You Really Prepared for a Cyberattack?

Veronica Haggar | March 3, 2021 | appsec, cyberattack, Cybersecurity, Cybersecurity 2021, devsecops, IAM, identity access management, passwordless, security threats
As the majority of businesses are increasingly moving to the online world, employees keep working remotely and more cyberattacks keep happening all over the globe, there is no doubt that embracing DevSecOps ...
Meeting the Need for Speed in Cyber Threat Response

Meeting the Need for Speed in Cyber Threat Response

contributor | April 25, 2017 | automation, cyberattack, cyberthreat, data breach, hackers, IT security, security information and event management, security response, SIEM
In the very early days of the internet, hackers most likely were "lone wolves." They might be an unhappy customer, a disgruntled employee or a tech-savvy youth who just wanted to see ...
From a Commodore 64 to DevSecOps

From a Commodore 64 to DevSecOps

Derek E. Weeks | March 20, 2017 | all day devops, cyberattack, devsecops, github, Jenkins, Nexus, security
We all know the story: a farm, a kid, a Commodore 64, and a modem maxing out at 300bps. A few unexpected phone bills later, and young Ian Allison is figuring out ...
Elasticsearch Ransomware Attacks Highlight Need for Better Security

Elasticsearch Ransomware Attacks Highlight Need for Better Security

contributor | January 27, 2017 | cyberattack, devsecops, Elasticware, Ransomware, security, servers
Recently, reports surfaced that a large number of Elasticsearch servers fell victim to potential ransomware attacks. Ransomware is the type of malware a company doesn’t want on its systems or network. It ...
Network Resilience and Security from A to Z

Network Resilience and Security from A to Z

contributor | September 30, 2016 | application behavior, applications, cyberattack, developers, development cycle, security, software bugs, testing
An observer watching a bunker shot by legendary pro golfer Gary Player was heard to say: “I’ve never seen anyone so lucky in my life.” The player retorted: “Yes, and the more ...
The Cost of Not Building with Security in Mind

The Cost of Not Building with Security in Mind

contributor | April 14, 2016 | cyberattack, devsecops, rugged devops, security, software defects, software development
The unfortunate reality for today’s organizations is the fact that a security breach is bound to happen. Major breaches are happening with alarming frequency and fill the news headlines almost daily. And ...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Accelerating Continuous Security With Value Stream Management
Monday, May 23, 2022 - 11:00 am EDT
The Complete Guide to Open Source Licenses 2022
Monday, May 23, 2022 - 3:00 pm EDT
Building a Successful Open Source Program Office
Tuesday, May 24, 2022 - 11:00 am EDT

Latest from DevOps.com

DevSecOps Deluge: Choosing the Right Tools
May 20, 2022 | Gary Robinson
Managing Hardcoded Secrets to Shrink Your Attack Surface 
May 20, 2022 | John Morton
DevOps Institute Releases Upskilling IT 2022 Report 
May 18, 2022 | Natan Solomon
Creating Automated GitHub Bots in Go
May 18, 2022 | Sebastian Spaink
Is Your Future in SaaS? Yes, Except …
May 18, 2022 | Don Macvittie

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

Hybrid Cloud Security 101
New call-to-action

Most Read on DevOps.com

Why Over-Permissive CI/CD Pipelines are an Unnecessary Evil
May 16, 2022 | Vladi Sandler
Apple Allows 50% Fee Rise | @ElonMusk Fans: 70% Fake | Micro...
May 17, 2022 | Richi Jennings
Making DevOps Smoother
May 17, 2022 | Gaurav Belani
DevOps Institute Releases Upskilling IT 2022 Report 
May 18, 2022 | Natan Solomon
Why Data Lineage Matters and Why it’s so Challenging
May 16, 2022 | Alex Morozov

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.