Mar 23, 2023 | Recent News
Are you aware of the National Cybersecurity Strategy announced by the Biden-Harris administration on March 2, 2023? Well, if you develop software, you better be. The goal of the strategy is for the U.S. Government to take the lead in creating a safe and secure digital...
Mar 22, 2023 | Recent News
Proliferating threats and increasingly complex IT architectures are putting significant pressure on teams to keep their enterprise systems secure. These trends show no signs of slowing down, which raises the question: How are IT leaders planning to address these...
Mar 16, 2023 | Recent News
Any piece of code can have a vulnerability. Whether application code or infrastructure code, errors, oversights and misconfigurations happen. The question developers must answer is, how many negative outcomes an attacker could realize because of that vulnerability....
Mar 9, 2023 | Recent News
CI/CD over the past decade has become the cornerstone of modern software development. The term – for continuous integration and continuous delivery (sometimes the “D” also can mean “deployment”) – emerged in the late 2000s with the rise...
Mar 9, 2023 | Recent News
You threat model to identify threats and implement mitigations before you deploy an application. In this regard, the overarching reason for your commitment to do threat modeling is to avoid incident response altogether. Theoretically, an application with no...
Mar 2, 2023 | Recent News
DevOps is a natural byproduct of the shift to agile software development and the move to the cloud. One of the main benefits of DevOps is the speed of software iteration, based on user stories and development sprints. The drawback to all this speedy development,...