Don MacVittie explains we're in the 'dream world' of data - where the cloud-native stack realizes the dream of portable…
With the pressure to release more rapidly, security is shifting left within the continuous development pipeline at most organizations. This…
We mentioned host intrusion detection and network intrusion detection in an earlier blog, and mentioned firewalls a couple of times…
Originally, this series was just going to be four articles on the DevSec side of DevSecOps. There are many reasons…
Managed Detection and Response (MDR), a relative newcomer in the cybersecurity realm, is starting to have a noticeable impact on…
This is the fourth installment in this series on DevSecOps. Read the first installment, on static analysis, here the second…
One of the things I’ve done for Accelerated Strategies Group recently is looking into DevSecOps toolsets. This is a fun…
Results of a survey of 103 IT professionals attending the recent DeveloperWeek Austin conference suggests that awareness of cybersecurity issues…
While there’s clearly a lot of interest in best DevSecOps processes, a survey of more than 3,000 DevOps practitioners suggests…
A new survey of 80 cybersecurity professionals that attended the recent RSA Conference 2018 event finds the number of organizations…