DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Tag: zero-trust

zero-trust governance trust

Secure Software Summit: Securing Software With Zero-Trust

Shinesa Cambric | March 16, 2022 | secure code, Secure Software Summit, Software Supply Chain, zero-trust
With the increase of supply chain attacks on everything from logging software like Log4j to takeovers of important JavaScript packages to compromises of network utility tools like SolarWinds, more and more organizations ...
remote zero-trust WFH

Zero-Trust Network Access Platforms Slash DevOps Bottlenecks

Marc Hornbeek | September 22, 2021 | devops, devsecops, remote access, zero-trust, ZTNA
In a prior article, I indicated why a new remote zero-trust platform is needed to support DevOps teams. Traditional remote access configurations are not well-suited for DevOps given a shifting user population ...
trust multi-cloud zero-trust

Establishing Trust in Multi-Cloud Environments

Sergio Pozo-Hidalgo | August 6, 2021 | devsecops, microservices, Multi-cloud, zero-trust
Modern applications are transforming enterprises into digital innovation factories. However, the distributed nature and complexity of modern apps have made it extremely difficult for organizations to maintain trust and compliance across multi-platform, ...
GitHub DevSecOps security Dynatrace Sophos Web Isolation and Secure Web Gateways with Menlo Security

Web Isolation and Secure Web Gateways with Menlo Security

Mitch Ashley | April 16, 2021 | Cloud Security, Menlo Security, secure web gateways, web isolation, zero-trust
Since the COVID-19 outbreak, many enterprises have implemented remote work policies to monitor network traffic and protect sensitive data. Organizations have been adjusting and adopting new practices and technologies to improve data ...
Kong HashiCorp service mesh

How Service Mesh Enables a Zero-Trust Network

Bill Doerrfeld | October 29, 2020 | microservices, security, service mesh, zero-trust
How can we achieve high-grade security within a microservices ecosystem? Service mesh may be the answer Enterprise applications often assign an identity to humans to determine security clearances. Using standards such as ...
microservices testing Your Applications Are the Weakest Security Link

Your Applications Are the Weakest Security Link

Leonid Sandler | May 5, 2020 | Cryptographic signature, devsecops, malicious software, zero-trust
Amazon, Microsoft and Google have much bigger security budgets than you do. They have hundreds of people all over the world ensuring that their infrastructure is secure. Their teams are constantly reviewing ...
5G continuous delivery

How 5G Mobile Networks Will Change IoT Security

Marty Puranik | February 26, 2020 | 5G, 5G mobile, 5G network, IoT security, security, zero-trust
Depending on your location, you might have noticed a new 5G icon on your cell phone recently. The roll-out of the new 5G mobile network is largely a positive change for consumers ...
Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management

Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management

Richard Diver | February 24, 2020 | IAM, identity and access management, Multi-cloud, multi-cloud adoption, security, zero-trust
This may well be the decade that the data center’s reign falls, and multi-clouds prevail. A multi-cloud strategy, which incorporates cloud services from multiple vendors, promises plenty of benefits, including improved resilience ...
DevOps Predictions

Predictions 2020: 7 DevOps Predictions Shaping 2020

Maya Ber Lerner | December 24, 2019 | customer experience, devops, infrastructure, predictions, serverless, SRE, value stream, zero-trust
2019 was an exciting year for DevOps practitioners, with DevOps adoption continuing to grow at a fast pace. Most organizations were either executing or evaluating their DevOps strategies. So, what is 2020 ...
Portable Security Policies: A DevSecOps Primer

Portable Security Policies: A DevSecOps Primer

Tom Hickman | June 14, 2019 | app security, application security, cloud environments, Cloud Security, devsecops, software developers, zero-trust
Protecting critical data and applications is a challenge under any circumstances, but it’s especially daunting when resources reside in the cloud. Most organizations today operate a significant portion of their workloads in ...
Simplify DevSecOps with a Zero Trust Approach

Simplify DevSecOps with a Zero Trust Approach

Tony Bradley | April 19, 2018 | devops security, devsecops, zero-trust
There are major cyberattacks and data breaches weekly, if not daily. Each incident is unique in some way, but one element common to almost all successful attacks is trust. Whether it’s a ...
Moving Security Beyond SSH and PKI

Moving Security Beyond SSH and PKI

contributor | December 5, 2017 | BeyondCorp, credentials, data security, ephemeral client certificates, IT security, PKI, PKI certificates, security, SSH, zero-trust
SSH (secure shell) is still the most common method of remotely accessing a Linux server, which makes it a common target for attackers attempting to infiltrate corporate networks. While the protocol itself ...
Show More Loading...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Continuous Deployment
Monday, July 11, 2022 - 1:00 pm EDT
Using External Tables to Store and Query Data on MinIO With SQL Server 2022
Tuesday, July 12, 2022 - 11:00 am EDT
Goldilocks and the 3 Levels of Cardinality: Getting it Just Right
Tuesday, July 12, 2022 - 1:00 pm EDT

Latest from DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New Normal’
June 30, 2022 | Richi Jennings
Moving From Lift-and-Shift to Cloud-Native
June 30, 2022 | Alexander Gallagher
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

DevOps: Mastering the Human Element
DevOps: Mastering the Human Element

Most Read on DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New No...
June 30, 2022 | Richi Jennings
Chip-to-Cloud IoT: A Step Toward Web3
June 28, 2022 | Nahla Davies
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.