Security

Security | News, how-tos, features, reviews, and videos

shutterstock 110543936 bumble bees and daisies in a green meadow under blue sky and white clouds
high five success winning happy shutterstock 1937300755

2 linux malware scarier

Linux distros need to take more responsibility for security

Between the rapid release of open source software, and modern OSes preloaded with packages, enterprises are vulnerable to attacks they aren’t even aware of.

A rubber duck sits on a target's bullseye  >  sitting duck / easy target / victim targeting

How generative AI changes cybersecurity

The impacts of large language models and AI on cybersecurity range from the good to the bad to the ugly. Here’s what to watch out for, and how to prepare.

ship wheel captain leadership

What ChatGPT doesn’t say about Kubernetes in production

Generative AI is already proving helpful across many relatively basic use cases, but how does it hold up when tasked with more technical guidance?

red eyed tree frog

JFrog adds ML model management to devsecops platform

JFrog unveiled a number of new platform capabilities including static application security testing and anti-tampering and compliance checks for software releases.

The shadow of hand unsettlingly hovers over a keyboard.

How to get a handle on shadow AI

By allowing the use of AI tools proven to be safe, but requiring them to be used within explicit guidelines, you can alleviate both employee frustration and organizational risk.

shutterstock 289153913 upward view of silver silos against a blue sky with clouds

Centralized cloud security is now a must-have

Cloud security is largely siloed by cloud provider. Enterprises are demanding strategic approaches for complex distributed multicloud deployments.

shutterstock 77260183 rusty old woodworking tools on the wall of an old workshop

The lost art of cloud application engineering

AI-driven coding is now in wide use, but we may not know all the risks of using it until the damage has been done. Think security problems and code that wastes resources.

virtual puzzle cube / problem-solving / solution / strategy

A new hope for software security

From package signing to SBOMs to new developer toolchains, the pieces for securing the software supply chain are starting to come together.

shutterstock 1127162939 traffic light  red yellow green code 1200x800

JFrog Curation blocks malicious open source software packages

DevSecOps system validates incoming software packages against JFrog’s security research library to establish a repository of trustworthy components for software developers to use.

shutterstock 740169646 red light red traffic light against a black background

Golang vulnerability checker flags Go vulnerabilities

Govulncheck is a command-line utility that uses the Go vulnerability database to identify known vulnerabilities in Go source code and Go binaries.

bucket with holes breach security vulnerability

The unhappy reality of cloud security in 2023

Let's talk about how you can stay off the growing list of companies that have been hacked. Spoiler alert: It takes money and commitment.

a hooded figure targets a coding vulnerability

Millions of GitHub repositories vulnerable to RepoJacking: Report

AquaSec analyzed a sample of 1% of GitHub repositories and found that about 37,000 of them are vulnerable to RepoJacking, including the repositories of companies such as Google and Lyft.

gears iot

GitLab Dedicated offers single-tenant, SaaS-based devsecops

Service hosted and managed by GitLab is geared to users with strict compliance requirements such as isolation, data residency, and private networking.

artificial intelligence good vs evil

Malicious hackers are weaponizing generative AI

The powerful capabilities of ChatGPT are being used against enterprise systems. Malicious packages and AI hallucinations are a few of the growing threats.

DevOps DevSecOps Security Pipeline

7 key features for Kubernetes and container security

Uptycs combines threat detection for Kubernetes and container runtimes, along with automated registry scanning and Kubernetes hardening checks. Here are the highlights.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Frontegg launches entitlements engine to streamline access authorization

Frontegg’s new entitlement engine will be powered by context-aware logic controls (CALC) technology to effect context-based, fine-grained authorization controls.

emergency disaster recovery business continuity binary by dsgpro getty images 182712891

Disaster recovery in the cloud

Underestimate the complexity and cost of cloud computing backup and recovery and you risk missing data and lost customers. Here’s what to do.

endless labyrinth 161827306

AppMap: A map to reduce developer toil

Open-source AppMap brings runtime code analysis into the developer’s code editor, providing the feedback needed to address performance and security issues during development and reduce code rework.

Load More