Automation in SOAR Goes Further with DevSecOps

Source:-https://securityboulevard.com Security teams are longing for automation capabilities. And, in recent years, their options have improved with Security Orchestration, Automation and Response (SOAR) and other security solutions like Security Information and Event Management (SIEM), Identity and Access Management (IAM), Endpoint Detection and Response (EDR), and Cloud Detection and Response (CDR) offering automation in a narrow capacity. A recent RSAC blog post suggested that SOAR, because of its likeness to infrastructure as code, is equal to DevSecOps. The article points out

Read more

Beware of these creatures lurking in your DevSecOps teams

Source:-https://sdtimes.com Halloween is upon us, and while much of the world is focused on scary creatures like ghosts, ghouls, or werewolves, DevSecOps teams have a few scary creatures of their own to deal with. From the Dracula-like developer stuck in a world from centuries ago who is thwarting the creation of secure apps, to the DevOps ghosts that downplay the importance of app vulnerabilities, it’s important for DevSecOps teams to understand the threats that may be lurking in their own

Read more

AIOps, DevSecOps, and Beyond: Exploring New Facets of DevOps

Source:-https://www.informationweek.com One of the essential goals of DevOps methodology is to establish a more concise approach to software delivery, especially in continuous integration/continuous deployment (CI/CD) environments. As organizations explore this approach, additional elements such as security have been introduced to streamline the cycle. It means developers may have to learn to wear several more hats, especially as some experts look to ways DevOps will continue to mature in 2021. Many organizations have already moved beyond the initial discovery of learning

Read more

StackRox Tool Prevents Kubernetes Misconfigurations

Source:-https://containerjournal.com StackRox today unveiled an open source static analysis tool dubbed Kubelinter that analyzes YAML files and Helm Charts to identify misconfigurations in Kubernetes deployments prior to deployment. Viswa Venugopal, staff software engineer at StackRox, says given the prevalence of misconfigured Kubernetes clusters it’s apparent there is a need for a security tool that IT teams can employ before a Kubernetes cluster is deployed. Written on the Go programming language, Kubelintr accomplishes that goal in a single binary file that

Read more

Aqua Security Simplifies Kubernetes Security

Source:-https://containerjournal.com Aqua Security today unveiled a Kubernetes Security Posture Management (KSPM) offering that provides IT teams with a set of policies and controls to automate configuration and compliance of Kubernetes clusters. In addition, Aqua Security has added a Kubernetes Runtime Protection module that provides an option for using Kubernetes Admission Controllers to deploy security controls as a set of sidecar containers directly on to a Kubernetes pod. KSPM comes with more than 20 predefined rules available out of the box

Read more

Boutique DevSecOps consulting firm, Hunter Strategy, has joined forces with GitLab to offer accelerated DevSecOps to Federal, Defense and Intelligence Agencies

Source:-https://www.prnewswire.com WASHINGTON, Oct. 20, 2020 /PRNewswire/ — In order to provide rapid innovation in the areas of DevSecOps and Agile software engineering, Hunter Strategy, a premier DevSecOps consultancy, has partnered with leading single application for the entire DevSecOps lifecycle provider, GitLab. Hunter Strategy joins the GitLab Partner Program as a reseller and strategic consulting partner to address government clients’ diverse DevSecOps implementation needs. Hunter will be migrating its DevSecOps acceleration framework, HunterOps, to be fully implemented on the GitLab Enterprise

Read more

GitHub envisions a world with fewer software vulnerabilities

Source:-https://www.helpnetsecurity.com “So much of the world’s development happens on GitHub that security is not just an opportunity for us, but our responsibility. To secure software at scale, we need to make a base-level impact that can drive the most change; and that starts with the code,” Grey Baker, GitHub’s Senior Director of Product Management, told Help Net Security. “Everything we’ve built previously was about responding to security incidents (dependency scanning, secret scanning, Dependabot) — reacting in real time, quickly. Our

Read more

DevOps: Banking on how financial institutions can benefit

Source:-https://www.atmmarketplace.com For banks, a common transformative action being implemented is moving a cornerstone application to a cloud environment. In this current “digital revolution,” timelines for product delivery and information analysis are few and far between. Customers set the pace by consuming products and information on-demand. This places immense pressure on banks to deliver continuously and reliably to satisfy the rapidly escalating demand for all types of the services they offer. Software is the center of the business universe, and it’s

Read more

Welcome to Cybersecurity Awareness Month 2020!

Source:-https://www.arnnet.com.au It’s October again, and that can only mean one thing – it’s the Cybersecurity Awareness Month! Observed each year, Cybersecurity Awareness Month aims to educate organizations and individuals on all things cybersecurity and encourage the more secure usage and implementation of software, applications, IoT devices, and more. To do our part and help spread awareness about the importance of cybersecurity, with a specific focus on software security, over the next few weeks, Checkmarx will be releasing a wide variety

Read more

5 Ways In Which AI Can Transform DevOps

Source:-https://analyticsindiamag.com The data generated in DevOps runs very well into exabytes. Not only it becomes difficult for the DevOps team to effectively absorb the data but also makes it challenging for them to apply solutions from this massive amount of data. The data generated by continuous integration and tools deployment is humongous. In fact, simple issues such as finding critical events usually take hundreds of hours. The number of integrations, the success rate, and defects per integration is only useful

Read more

Latest Docker Container Attack Highlights Remote Networking Flaws

Source:-containerjournal A security flaw that provides a backdoor through which Docker containers can be compromised via unsecured remote connections may require IT teams to revisit their approach to DevSecOps. At the core of the issue is a cryptomining worm discovered by Cado Security, which steals credentials from Amazon Web Services (AWS) that have been stored on a local PC. Once those credentials have been stolen, a team of cybercriminals dubbed TeamTNT scans the internet for misconfigured Docker containers to exploit

Read more

Achieving gains in government IT performance with DevSecOps

Source:-fcw.com A software development team in the Boston office of Kessel Run, a program within the DOD’s Defense Innovation Unit (U.S. Air Force photo by J.M. Eddins Jr.) Eli Whitney, the inventor of the cotton gin, demonstrated the value of interchangeable parts in 1801 to the U.S. Congress, President John Adams and President-elect Thomas Jefferson. Whitney proved the viability and the military value of interchangeable parts by stripping down several muskets, then reassembling a functional musket from random parts from

Read more

How to champion security in DevOps

Source:-securityboulevard.com Making the shift from DevOps to DevSecOps requires better communication, which you can help your teams accomplish with security training and enablement. If DevSecOps isn’t working very well in your organization, you can probably sum up the issue in the same way as “Cool Hand Luke”: “What we have here is a failure to communicate.” Which should not be a shock. While DevSecOps has been around for at least five years, it is still working its way into the

Read more

DevOps Unbound: Exploring Acceleration and Automation, Setting DevOps Free

Source:-devops.com We are launching a new video series Thursday, Aug. 6, called DevOps Unbound. DevOps Unbound will focus on DevOps, automation, CI/CD and testing, featuring leaders in these areas as we explore the challenges and issues software delivery and IT teams face every day. How do we go faster, smarter with better quality? DevOps Unbound! The series will premier on our TechStrong.tv streaming network and should start around 10:40 a.m. Eastern tomorrow, August 6th. It will be available on Linkedin

Read more

Why Secure DevOps is the New Sheriff in Town

Source:-securityboulevard.com We’ve listened to the pain points of CISOs around the country, many of whom say managing an effective application security program often feels like trying to survive in the Wild West. It’s a great metaphor. You’ve got cowboys and gunslingers and outlaws. There are open frontiers and endless opportunities for pioneers. But instead of dodging bullets, CISOs are now facing modern challenges like championing cybersecurity efforts, unifying DevOps with security, managing the security of complex IT infrastructures and complying

Read more

MuseDev Offers DevOps-Optimized Security Code Analyzer

Source:-devops.com MuseDev today announced it has made available on GitHub under an early access program a code analysis tool dubbed Muse that is designed to surface cybersecurity issues as pull requests are made from the repository. Company CEO Stephen Magill said rather than waiting to discover cybersecurity issues after an application is deployed, Muse makes it easier for IT teams to consistently employ best DevSecOps practices. There’s general agreement DevOps teams should assume more responsibility for application security as part

Read more

Centrify Empowers Devsecops With A New Approach To Identity And Access Management For Applications And Services

Source:-securityboulevard.com Delegated Machine Credentials support “infrastructure as code” to seamlessly incorporate privileged access management into the DevOps pipeline ANTA CLARA, Calif. ― July 28, 2020 ― Centrify, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions, today debuted Delegated Machine Credentials (DMC) as part of the Centrify Privileged Access Service to reduce risk and empower automation in increasingly complex, infrastructure-as-code-based elastic environments. Centrify DMC enables organizations to reduce their reliance on service accounts with static credentials used to access

Read more

How to secure software in a DevOps world

Source:-helpnetsecurity.com The COVID-19 pandemic and its impact on the world has made a growing number of people realize how many of our everyday activities depend on software. We increasingly work, educate ourselves, play, communicate with others, consume entertainment, go shopping and do many other things in the digital world, and we depend on software and online services/apps to make that possible. Software is now everywhere and embedded within just about everything we touch. The pandemic has also significantly accelerated companies’

Read more

JFrog Drives “DevOps With a Mission,” Brings Community Together Online for Annual swampUP Conference

Source:-expresscomputer.in JFrog, the Universal DevOps technology leader known for enabling “Liquid Software” via continuous software release flows, announced the lineup for its annual DevOps community and JFrog user conference swampUP, which will take place online June 23 and 24 for the Americas and June 30 and July 1 for EMEA & APAC. Notably, all-conference registration proceeds will be donated to COVID-19 charities. “Since JFrog’s inception, we’ve partnered with the community to bring top tools and methodologies to the market, always

Read more

Accelerating the DevOps process during Covid-19: How CFOs and CISOs can work together

Source:-cloudcomputing-news.net The Covid-19 pandemic has brought about a new normal. Remote working and videoconferencing has never been more popular; and as a direct consequence, the cloud has never been more popular either. Yet a note of caution needs to be applied to those looking at full-speed migration. Jeremy Snyder of DivvyCloud told this publication in April that ‘people are really good at creating stuff, but not at cleaning up after themselves’, while writing last month Margaret Rogers, VP at Pariveda

Read more
1 2 3 4 5 6 15