Tag: Articles
-
Article: Who Moved My Code? An Anatomy of Code Obfuscation
In this article, we introduce the topic of code obfuscation, with emphasis on string obfuscation. Obfuscation is an important practice to …
-
Article: Successfully Integrating Dynamic Security Testing into Your CI/CD Pipeline
Dynamic security testing tools don’t require advanced cybersecurity knowledge to operate. Integrating DAST into your CI/CD pipeline …
-
Article: What Does Zero Trust Mean for Kubernetes?
Zero trust is a powerful security model that’s at the forefront of modern security practices. It’s also a term that is prone to buzz …
-
Business Best Practices For Remote Access Security
Remote access was valid for a rare few business domains some years ago, but the pandemic changed the picture altogether. Almost every …
-
Article: What Developers Must Know About Zero Trust
Zero trust solves the problem of open network access by selectively allowing access only to the specific resources a user should be allowed …
-
Article: Managing Kubernetes Secrets with the External Secrets Operator
Kubernetes secrets is a mechanism that allows sensitive information to be stored in a central repository called etcd, which is a more …
-
Article: Using DevOps Automation to Combat DevOps Workforce Shortages
Introduction: Workforce Shortages The well-documented demand for (and shortage of) DevOps engineers is a persistent itch that has remained …
-
Article: API Friction Complicates Hunting for Cloud Vulnerabilities. SQL Makes it Simple
APIs can tell you everything about your cloud infrastructure but they’re hard to use and work in different ways. What if you could write …
-
API Security: logic-based threats and how to combat them
APIs bring tremendous value to businesses in every sector. They’re great for promoting collaboration and partnership and allow a kind of …
-
Article: The Role of DevOps in Cloud Security Management
Different areas of cloud security must be examined to strengthen security in the cloud versus security of the cloud. This includes …
-
Article: Strategies for Assessing and Prioritizing Security Risks Such as Log4j
The evolving threat landscape requires a comprehensive approach to mitigation. An effective strategy is built on visibility, assessing …
●●●