Security
Security | News, how-tos, features, reviews, and videos
The tech leader's guide to 2023
What's ahead for cryptocurrency, cybersecurity, AI-based application development, and extended reality in 2023? Here's a roadmap from some of tech's most forward-thinking leaders.
How multicloud changes devops
More clouds, more complexity, more challenges. Now’s the time to prepare for the impact multicloud will have on your devops teams.
C++ creator Bjarne Stroustrup defends its safety
US National Security Agency recommends using memory safe programming languages instead of C/C++ when possible, because hackers frequently exploit memory issues.
Canonical security subscriptions for Ubuntu Linux now available
Security maintenance service for Ubuntu LTS releases offers CVE protection and security updates for some 23,000 packages beyond the main OS.
Researchers warn of malicious Visual Studio Code extensions
Attackers could easily spoof popular Visual Studio Code extensions and trick developers into downloading them, Aqua Nautilus researchers report.
Why zero knowledge matters
Zero-knowledge proof is the next big evolution for blockchain and Web3. A recent survey reveals how adopters are using ZKP now and what to expect in the future.
How Steampipe enables KPIs as code
CMD Solutions built tools for continuous controls assurance by using open-source Steampipe to define information security performance metrics as SQL statements.
Open source security fought back in 2022
One year after the Log4j disaster, open source community efforts and new developer toolchains are addressing the challenges of software supply chain security.
Complexity is the enemy of cloud security
Cloud security and IT security in general often overlook complexity. It’s not taught in security courses, and most experts don’t consider it in risk analytics.
Cloud computing gets back to basics
Recent trends show a return to cloud fundamentals, such as data, development, deployment, and security, rather than chasing what’s new and cool.
What is DevSecOps? Securing devops pipelines
DevSecOps evolves devops concepts with tools and practices that embed security in every layer of the software development life cycle. Here's why more companies are embracing DevSecOps.
AWS' Inspector offers vulnerability management for Lambda serverless functions
AWS announces new cybersecurity features in Amazon Inspector and Amazon Macie at AWS Re:Invent 2022 in Las Vegas.
AWS releases Wickr, its encrypted messaging service for enterprises
The release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to allow secure collaboration across messaging, voice, video and file sharing.
What observability means for cloud operations
When you look at your operations data, do you know what you’re seeing? Observability can help you gain more insights from complex cloud deployments.
Cloud architects are afraid of automation
Automation is one of the greatest gifts to cloud architecture, operations, security, and finops. Yet, many architects still are reluctant to use it. What's so scary?
Qualys previews TotalCloud FlexScan for multicloud security management
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.
Azul detects Java vulnerabilities in production apps
Azul Vulnerability Detection promises to eliminate false positives without impacting performance, by drawing on monitoring and detection capabilities inside the Azul JVM.
3 primo cloud computing jobs in 2023
The cloud boom and its resulting issues are boosting the pay and prestige of certain roles. Here's what it takes to be an architect, operations engineer, or security engineer.
Why you’re getting cloud security wrong
New data shows that many enterprises are not approaching cloud security correctly, and it’s going to lead to unpleasant consequences.
Most reported CVEs for Docker Hub images are harmless
JFrog used Xray Container Contextual Analysis to scan the 200 most popular community images in Docker Hub, then tallied the results for the 10 most common CVEs. 78% were not exploitable.