zero-trust

Your Applications Are the Weakest Security Link

Amazon, Microsoft and Google have much bigger security budgets than you do. They have hundreds of people all over the…

3 months ago

How 5G Mobile Networks Will Change IoT Security

Depending on your location, you might have noticed a new 5G icon on your cell phone recently. The roll-out of…

5 months ago

Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management

This may well be the decade that the data center’s reign falls, and multi-clouds prevail. A multi-cloud strategy, which incorporates…

5 months ago

Predictions 2020: 7 DevOps Predictions Shaping 2020

2019 was an exciting year for DevOps practitioners, with DevOps adoption continuing to grow at a fast pace. Most organizations…

7 months ago

Portable Security Policies: A DevSecOps Primer

Protecting critical data and applications is a challenge under any circumstances, but it’s especially daunting when resources reside in the…

1 year ago

Simplify DevSecOps with a Zero Trust Approach

There are major cyberattacks and data breaches weekly, if not daily. Each incident is unique in some way, but one…

2 years ago

Moving Security Beyond SSH and PKI

SSH (secure shell) is still the most common method of remotely accessing a Linux server, which makes it a common…

3 years ago

Zero Trust Is a Key to DevOps Security

Once upon a time, network and endpoint security was a simple matter of us vs. them—and all you had to…

4 years ago