Tag: Secure
-
What Is DevSecOps? Six Steps to Secure Your Software Delivery
While the DevOps approach to software delivery has positively revolutionized the IT industry, the security requirements have largely been …
-
How to Use ownCloud to Set Up a Secure Private Cloud
The power of the cloud makes for a level playing field between the big players and the smaller ones. Here’s a simple tutorial on how to …
-
Quick Take: The Developer’s Role in the Future of Secure Software Development [Video]
The State of Software Security Volume 9 offers some of the most dramatic and concrete evidence to date on the positive effect DevSecOps …
-
Portshift Platform Looks to Secure Application Identity in the Cloud
Assigning identity to applications has long been a challenge for organizations and it’s one that new startup Portshift is now looking to …
-
Quick Take: The Developer’s Role in the Future of Secure Software Development
The State of Software Security Volume 9 offers some of the most dramatic and concrete evidence to date on the positive effect DevSecOps …
-
Vade Secure launches IsItPhishing Threat Detection to help SOCs identify phishing URLs
Vade Secure launched IsItPhishing Threat Detection, an anti-phishing solution that helps Security Operations Centers (SOCs) identify and …
-
How to Use an iPod Touch as a Secure Device Instead of a Phone
From SIM-jacking, to SS7, to dodgy telco data selling, for some people an iPod may be a better security decision than using a normal phone. …
-
Protect Your Django Web Application From Security Threats
Introduction Security is vital but variable according to the functionality of the web application. Some companies might have a greater …
-
5 Things the Most Secure Software Companies Do (and How You Can Be Like Them)
What sets apart the largest and most innovative software engineering organizations? Here are five approaches for changing your security …
-
How Safe and Secure are Wearables?
As of May 2018, all EU citizen’s privacy rights are legally protected by the General Data Protection Regulation (GDPR). GDPR compliance is …
-
Apricorn Aegis Secure Key 3NX: An ultra-secure 256-bit AES XTS hardware-encrypted USB flash drive [Review]
Storing files in the cloud means they are easily accessible from anywhere, but if you have private data that you can’t afford to fall …
-
Midterms 2018: The Unprecedented Effort to Secure Election Day
campaign rattled the 2016 United States election season, scrutiny over this year’s midterms has been intense. And while foreign …
●●●