DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Tag: hackers

vulnerabilities

Benefits and Challenges of Bug Bounty Programs

Bryan Becker | April 2, 2020 | bug bounty, bug bounty programs, hackers, white hat hackers, white hats, Xbox, Xbox Bounty Program
Trying to get ahead of the bugs and vulnerabilities that cause security breaches and hacks has become an increasingly high priority in recent years across a variety of industries. With a growing ...
cloud

Server Security: Minimizing Risk in 3 Steps

Greg Keller | February 12, 2020 | hackers, hardware security, IT admin, server access, server control, servers, threats
Servers located directly on the internet run one of the highest risks of being compromised. It’s just too easy for hackers to find an open “door” or “window” into those servers and ...
DevOps: Here’s How to Slack Securely

DevOps: Here’s How to Slack Securely

Pete Cheslock | May 1, 2017 | collaboration, hackers, privacy, protocols, security, Slack
With 1.7 million daily active users, it’s clear Slack has come to dominate the team chat world, especially in the tech industry. This, however, means that a fair amount of security is ...
Meeting the Need for Speed in Cyber Threat Response

Meeting the Need for Speed in Cyber Threat Response

contributor | April 25, 2017 | automation, cyberattack, cyberthreat, data breach, hackers, IT security, security information and event management, security response, SIEM
In the very early days of the internet, hackers most likely were "lone wolves." They might be an unhappy customer, a disgruntled employee or a tech-savvy youth who just wanted to see ...
8 Ways to Focus on Cloud Software Security

8 Ways to Focus on Cloud Software Security

contributor | November 29, 2016 | audits, cloud, Cloud Security, compliance, continual compliance, cyberthreats, hackers, web applications
Cloud Software Security Examined Cloud software security is critically important. Take, for example, health care: Doctors and other healthcare professionals are one of the biggest users of cloud software, yet recent studies ...
DEF CON: Where Have All the Black Hats Gone?

DEF CON: Where Have All the Black Hats Gone?

contributor | September 2, 2016 | black hats, conference, DEF CON, hackers, security, white hats
DEF CON is one of the most controversial conferences in the world. Only at that annual event have arrests been made, legal threats shut down presentations and zero-day attacks been anted in ...
Cloud Security Tips: How to Prevent Hackers from Breaching Your Cloud

Cloud Security Tips: How to Prevent Hackers from Breaching Your Cloud

Brian Wheeler | August 19, 2016 | backups, Cloud Security, cloud security tools, encrypted data, hackers
Recent data system breaches at Oracle and Sage reminds us all that the continuous threat of criminal hacking of cloud security systems is not abating. Rather, it’s becoming routine. Business managers, lawmakers ...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Boost Your Java/JavaScript Skills With a Multi-Experience Platform
Wednesday, June 29, 2022 - 3:30 pm EDT
Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines
Thursday, June 30, 2022 - 11:00 am EDT
Automating the Observer: Lessons From 1,000+ Incidents
Thursday, June 30, 2022 - 1:00 pm EDT

Latest from DevOps.com

Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie
Chip-to-Cloud IoT: A Step Toward Web3
June 28, 2022 | Nahla Davies
DevOps Connect: DevSecOps — Building a Modern Cybersecurity Practice
June 27, 2022 | Veronica Haggar
What Is User Acceptance Testing and Why Is it so Important?
June 27, 2022 | Ron Stefanski

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

The 101 of Continuous Software Delivery
New call-to-action

Most Read on DevOps.com

The Age of Software Supply Chain Disruption
June 23, 2022 | Bill Doerrfeld
Cloudflare Outage Outrage | Yet More FAA 5G Stupidity
June 23, 2022 | Richi Jennings
Developer’s Guide to Web Application Security
June 24, 2022 | Anas Baig
What Is User Acceptance Testing and Why Is it so Important?
June 27, 2022 | Ron Stefanski
DevOps Connect: DevSecOps — Building a Modern Cybersecurity ...
June 27, 2022 | Veronica Haggar

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.