How VPCs Work, and How to Integrate Them Into Identity Access Security

How VPCs Work, and How to Integrate Them Into Identity Access Security

While much of the tech world is adopting the private cloud for the added security and scalability, today’s developers typically rely on its public, less secure cousin. The reason is simple: it’s way cheaper. “Private” cloud infrastructure requires providers to assign...
DevSecOps Is Best When Applied in Layers

DevSecOps Is Best When Applied in Layers

By Michael Vizard The best cybersecurity defense is always applied in layers. If one line of defense fails, the next should be able to thwart an attack and so on. That same, tried and true, security in depth concept applies to DevOps as responsibility for...
Addressing the DevSecOps Dysfunction In Your Cloud

Addressing the DevSecOps Dysfunction In Your Cloud

There is a consensus emerging demanding developers to assume more responsibility for security as more organizations embrace best DevSecOps practices and move to the cloud. The trouble is, most organizations aren’t providing the guidance and tools developers need to...
ThreatModeler Launches Free, Lite Community Edition

ThreatModeler Launches Free, Lite Community Edition

As organizations struggle to maintain support of security initiatives during uncertain times, ThreatModeler is contributing its industry leading technology to embolden the DevSecOps community to continuously prioritize the protection of their applications – in minutes...
Important Facts to Know About the California Consumer Privacy Act (CCPA)

Important Facts to Know About the California Consumer Privacy Act (CCPA)

With concerns over data security mounting, the State of California enacted its California Consumer Privacy Act (CCPA) on January 1, 2020. This article will help businesses to understand the CCPA with information for anyone that collects, shares and sells the personal...