Application Security

Application Security | News, how-tos, features, reviews, and videos

nw speedometer speed measuring by geralt via pixabay linda perez johannessen via unsplash 2400x1600

7 devops practices to improve application performance

Devops is tough, but the choice between faster development and improving reliability shouldn't be. Consider shifting-left security, better observability, AIops platforms, and more.

conveyor production continuity distribution shipping

Are you ready to automate continuous deployment in CI/CD?

Making the leap from continuous delivery to continuous deployment requires the right skills, practices, and tools. Use this five-point checklist to prepare for launch.

hot coffee java beans cup steam

Okta’s Matt Raible: How I became a Java hipster

The Okta developer advocate and JHipster evangelist discusses Java and JavaScript development, monoliths and microservices, software scaling vs. people scaling, and making security friendlier for developers.

digital fabric

Detect cloud native security threats with Tracee

Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.

chain rust link heavy iron metal

GitHub adds supply chain security tools for Rust language

GitHub’s supply chain security features including the advisory database, Dependabot alerts, and dependency graph are now available for Rust Cargo files.

Blue Hexagon network security

Maximize your cloud security with isolation zones

Security zones keep your applications and their data safe from bad actors and can help limit the impact of a security breach.

apple augmented reality2

Only DevSecOps can save the metaverse

The vast metaverse will also be vast in terms of code, accelerating the demand for supply chain security, automated scanning and testing, and continuous updates.

A network of linked question marks.

9 questions you should ask about your cloud security

Businesses often lack critical insights into the security of their cloud environment. Here are nine questions business leaders need to ask—and cloud security teams need to answer.

programmer certification skills code devops glasses student by kevin unsplash

Progress launches Chef Cloud Security to extend DevSecOps to cloud-native assets

The software provider has also enhanced its underlying security and compliance mechanism Chef InSpec with new features.

Warning: Cloud Disaster Ahead

7 ways to avoid a cloud misconfiguration attack

Cloud security is all about configuration. Here’s how to make sure the configurations of your cloud resources are correct and secure, and how to keep them that way.

Binary stream flowing through the fingers and palm of an upturned hand.

Is low-code safe and secure?

Handled appropriately, low-code development tools pose no additional security risk over any other platform, system, or development environment.

abstract binary code

Pulumi launches Business Critical edition for enterprise customers

The infrastructure as code provider is adding new enterprise features as it looks to meet the needs of larger organizations.

A magnifying lens exposes an exploit amid binary code.

Harvard census identifies most commonly used open source packages

Researchers hope that by raising awareness of the most widely used open source packages, they can help prevent the next Log4j or Heartbleed exploit from happening.

A network of connected virtual container blocks.

VMware adds container runtime protection to Carbon Black security portfolio

The virtualization specialist is looking to help customers secure their containerized environments from build through deployment.

Encryption  >  Encrypted data / hexadecimal code

Understand the RSA encryption algorithm

The RSA algorithm is a feast of genius that combines theoretical math and practical coding into working asymmetric cryptography. Here’s how it works.

cyber security shield lock protect

How to protect your Kubernetes infrastructure from the Argo CD vulnerability

A zero-day vulnerability in Argo CD could be putting sensitive information like passwords and API keys at risk. Are you protected?

Skull and crossbones emerge from a stream of digital cubes / malicious code / hacking / threat

WhiteSource report warns of NPM registry risks

Provider of open source vulnerability scanning software finds malicious packages on widely used JavaScript package registry.

Skull and crossbones emerge from a stream of digital cubes / malicious code / hacking / threat

Faker NPM package back on track after malicious coding incident

A new group of maintainers is proceeding with an ‘official’ version of the Faker JavaScript library after the previous maintainer went rogue.

micro segmentation security lock 2400x1600

Suse open sources NeuVector container security platform

After acquiring NeuVector last year, Suse wasted no time in open sourcing the ‘full lifecycle’ container security platform for all Kubernetes users.

A broken link in a digital chaing / weakness / vulnerability

2022: The year of software supply chain security

Strengthening the software supply chain must be priority No. 1 in the new year. Here are three areas to focus on.

Load More