DevOps
Resources

FILTER BY

5 Software Security Best Practices

5 Software Security Best Practices

In a world where cybersecurity breaches are growing steadily in frequency and intensity, software security is a critical consideration for businesses of all types and sizes. Devising a plan for securing software, however, can be a major challenge today. Application architectures are becoming more and more complex as organizations migrate to microservices, multicloud or hybrid…
Gestion des vulnérabilités logicielles: Un guide pas à pas

Gestion des vulnérabilités logicielles: Un guide pas à pas

Les vulnérabilités logicielles sont des problèmes dans les logiciels que les attaquants peuvent exploiter pour prendre le contrôle d’une application, voler des données, perturber le service aux utilisateurs ou causer d’autres dommages. En raison de la complexité des applications et des environnements dans lesquels elles fonctionnent, il est pratiquement impossible d’empêcher les vulnérabilités d’exister dans…
EKS Anywhere guide

EKS Anywhere guide

EKS Anywhere is an offering in the Amazon Web Services (AWS) that makes it possible to run AWS’s Kubernetes distribution, Elastic Kubernetes Service (EKS), on privately owned (self-hosted) infrastructure. EKS itself is a cloud-based Kubernetes service that originally could deploy clusters only on infrastructure that was hosted in the AWS cloud. By introducing EKS Anywhere…
How to Choose a Software Composition Analysis (SCA) Tool

How to Choose a Software Composition Analysis (SCA) Tool

By identifying risks within code that developers can easily overlook, Software Composition Analysis (SCA) tools play a vital role in helping to manage both security risks and open-source licensing risks. This article explains how SCA tools work and offers tips on what to look for when comparing SCA options. What is Software Composition Analysis? Software…
Tips and Tools for Managing Application Security

Tips and Tools for Managing Application Security

Application security is one of the fundamental pillars of overall IT security. Baking security into your application architecture, code and development lifecycle is essential for establishing a strong security posture. This article explains how to do that by identifying the tools and practices that enable strong application security. What is application security? Application security is…
Understanding Open Source Vulnerabilities

Understanding Open Source Vulnerabilities

Incorporating open source libraries, applications, container images or other components into your organization’s own software offers a variety of benefits. It speeds deployment processes, saves development resources and (because open source is usually free to use) may lower licensing costs. However, any team that uses open source as part of its own software stack must…
Comprendre les vulnérabilités en matière de sécurité

Comprendre les vulnérabilités en matière de sécurité

La gestion des vulnérabilités en matière de sécurité est difficile, non seulement parce que les vulnérabilités peuvent être difficiles à détecter, mais aussi parce qu’il existe de nombreux types de vulnérabilités. Heureusement, il existe des outils et des techniques qui permettent de remédier aux différents types de vulnérabilités qui peuvent se cacher dans n’importe quelle…
How to Choose a CI/CD Platform

How to Choose a CI/CD Platform

Any organization that practices DevOps must have a Continuous Integration/Continuous Delivery, or CI/CD solution in place. But the specific CI/CD platform that a team chooses can vary widely. There are many available, each with a different set of features. Here’s what to look for in a CI/CD platform and how to find the best solution…
12 Essential Docker Commands

12 Essential Docker Commands

Docker, the open source container platform, has become a must-know technology for many admins and developers. Even if deploying and managing containers is not a major part of your job -- or if you use a container orchestrator like Kubernetes  -- a basic familiarity with Docker is important for developing and managing a variety of…
How to Scan Your Golang Build for Vulnerabilities

How to Scan Your Golang Build for Vulnerabilities

Golang (or Go, as it is commonly called) is a programming language that originated at Google in 2007.Go has become popular with developers over the past decade due largely to its reputation as a language that is easy-to-learn. It also offers the benefits of readable, well-structured code, and it features robust support for concurrency -…