The Story of Crush: The Microservice That Navigated the Cloud Native O... Mattias Gees & Tom Meadows

Getting Started With SPIFFE For Multi-Cloud Secure Workload Authentication

| | DevSecOps, Tutorials
SPIFFE stands for Secure Production Identity Framework for Everyone, and aims to replace single-factor access credentials with a highly scalable identity solution. This blog post provides some practical applications of SPIFFE in ...
image2

Five Gartner Reports. Four Categories. What Does OX Security Do Anyway?

Analyst firms play an important role in the tech vendor landscape. Their reports help buyers and would-be buyers learn about vendors and their offerings. In cybersecurity, in particular, buyers use analysts’ outputs ...
SBOMs Critical to Software Supply Chain Security

SBOMs Critical to Software Supply Chain Security

By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube)LAS VEGAS – One day before the Black Hat Briefings started in Vegas last week, a group of experts met at ...

Empowering the Shift: From Integration to Innovation in Application Security

Last month, we explored how organizations can reclaim control over their Application Security (AppSec). Building on that discussion, we now delve deeper into the transformative steps necessary for security decision-makers to redefine ...
The Importance of Domain and DNS Lifecycle Management with Mergers and Acquisitions

The Importance of Domain and DNS Lifecycle Management with Mergers and Acquisitions

As a curious reader of global consulting service reports, one report especially around Global Mergers and Acquisitions (M&A) caught my eye. The world of strategic M&A saw deals totaling about $3.1 trillion ...
package-lock.json file

A Developer’s Tutorial to Using NPM Audit for Dependency Scanning

Many developers overlook the risks lurking in third-party packages. Every package you add could harbor vulnerabilities, potentially exposing sensitive user data and granting unauthorized access to The post A Developer’s Tutorial to ...
Tenable, application security, vulnerabilities, software, vulnerabilities, issues, servers, vulnerability, Linux, vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level

Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabilities in an IT environment that should be remediated first based on the actual threat they ...
Security Boulevard
DevSecOps

DevSecOps

As the importance of securing software supply chains continues to grow, DevSecOps practices are being increasingly adopted to meet this demand. The challenge lies in optimizing these processes to ensure developers embrace ...

Toil Not: Automate DevOps Governance

By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube) In this show, Deb interviews two innovative technologists driving the DevOps Automated Governance movement ...
Always Be Updating

Always Be Updating

DevSecOps Engineer Gene Gotimer explains why constant software dependency updates are crucial for security in DevSecOps practices ...

Application Security Check Up