Attackers are using cloud services to mask attack origin and build false trust

Source- techrepublic.com Security experts love talking up the importance of trusted websites. Google’s dominant Chrome browser—which has held about two-thirds of the browser market share all year—emphasized the importance of this with its lock icon, indicating that traffic was encrypted. It’s a useful heuristic, easy for end users to understand. Lock equals security. It’s skeuomorphism at its best, but it lulls users into a false sense of security. A Wednesday report from Menlo Security finds that attackers are using cloud hosting services to avoid detection, opting to

Read more

Five Best Practices for DevOps Automation

Source- cioreview.com Open source libraries and frameworks play a crucial role in the DevOps environment that emphasizes the shorter development lifecycles, collaboration, and innovation. It’s important not to neglect the security of these open source components. Here we will talk about five things that one must consider concerning the safety of an open source project. •  Security Automation A significant driving force for DevOps is to automate as much as possible. DevOps automation emphasizes using technologies like virtual machines and containerization to

Read more

3 Tips to Build A DevSecOps Organization

Source- devops.com For organizations undergoing digital transformation today, modernizing the existing environment can present serious challenges when it comes to security. Whether you’re dealing with a transition from legacy to cloud or hybrid models, or shifting from ITIL and waterfall methodologies to DevOps, the increasing number of technologies and complexity mean you need to rethink your security posture. The traditional approach to security—that is, a static strategy that largely involves patching on piecemeal measures at the 11th hour—is simply not a

Read more

DevSecOps: Focus training on 3 key areas

  Source- enterprisersproject.com DevOps, with its fast and frequent release cycles, is the new environment that organizations need to contend with in order to stay competitive in the market. It is especially challenging when security considerations come into play since developers don’t often have secure coding expertise and since security practices traditionally stall release cycles. Despite its necessity, establishing a DevSecOps environment in an organization is no simple feat; it is a complicated, multi-layered process, and much of its success relies on the reinforcement of strong

Read more

Pentagon Cloud Computing Deal Could Give Amazon Monopoly

Source- investors.com Good news for Amazon.com employees is not necessarily good news for everyone else. For example, consider the announcement that Amazon.com will now pay at least $15 per hour. That may be great for current employees, but it’s bad for any smaller companies that hope to compete with Amazon on price. Amazon has a history of cutting prices to dominate a developing space, then using its massive market power to block others from even entering. That’s why it opposed internet sales taxes for

Read more

Bridging the priority gap between IT and security in DevOps

Source- betanews.com Let’s start with a test. Suppose that you manage a corporate network gateway across which a critical programmed transaction is scheduled to occur in exactly one hour. Suppose further that the firewall protecting this gateway is functionally misbehaving and will almost certainly block any programmed activity with your transaction partner. This is a serious concern because your boss has reinforced to you several times the importance of this planned transaction. Your team continues to work the technical problem,

Read more

Putting Security on Par with DevOps

Source- darkreading.com DevSecOps: It’s not a very friendly acronym. It reeks of techno-babble, sounds a little military, and resists a consumer connection. But think again. This is a vital discipline that’s directly relevant to every enterprise and every individual, particularly within cloud infrastructures, and has long deserved greater attention. Maybe that’s why we’re now seeing greater research and more discussion devoted to the subject. But what’s really at stake here? And what needs to happen next? First, let’s understand the

Read more

5 Reasons DevOps And Security Need To Work Together

Source- forbes.com There is nothing like speeding up your business processes and development cycles is there? DevOps has revolutionized the way businesses meet the constantly evolving needs of their customers, without sacrificing productivity. Even as good as it sounds, it can still come at a price if DevOps and security are not working together. With the speed at which new iterations are released, it can be tough for security to keep up. In fact, 68 per cent of cybersecurity professionals are demanded

Read more

Google Cloud rolls out security feature for container images

Source- zdnet.com Google on Wednesday announced a new feature for developers in the early stages of the continuous integration and continuous delivery (CI/CD) process. All container images built using Cloud Build, Google’s fully-managed CI/CD platform, will now be automatically scanned for OS package vulnerabilities. The Container Registry vulnerability scanning feature is currently in beta. The cloud is disrupting traditional operating models for IT departments and entire organizations. The images will be scanned for vulnerabilities when they’re pushed to Container Registry

Read more

Integrating security into DevOps

Source – networksasia.net Many developers today find themselves working in a DevOps (“development and operations”) setup in which an agile relationship exists between development and IT operations, with close communication and collaboration between these business units. DevOps brings many advantages such as releasing features and fix bugs faster using Agile methodologies, CI/CD processes, and open source tools. However, traditional security activities can’t seem to keep up with this fast-paced tempo. How can you make sure security doesn’t get left behind? The

Read more
1 2 3 4 6