How Threat Modeling Can Remove Security Blockers On Your Journey to the Cloud

How Threat Modeling Can Remove Security Blockers On Your Journey to the Cloud

There’s no shortage of content on the internet that extolls the great virtues of cloud computing. And they’re largely correct. The cloud offers numerous major advantages like reduced cost, ease of scalability, and access to bleeding-edge tech services and...
Differentiating Compliance and Security for AWS Development

Differentiating Compliance and Security for AWS Development

How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key differences. Both deal with organizational safety and security, minimize risk, protect consumer data, and experience...
DevSecOps Is Best When Applied in Layers

DevSecOps Is Best When Applied in Layers

By Michael Vizard The best cybersecurity defense is always applied in layers. If one line of defense fails, the next should be able to thwart an attack and so on. That same, tried and true, security in depth concept applies to DevOps as responsibility for...
Addressing the DevSecOps Dysfunction In Your Cloud

Addressing the DevSecOps Dysfunction In Your Cloud

There is a consensus emerging demanding developers to assume more responsibility for security as more organizations embrace best DevSecOps practices and move to the cloud. The trouble is, most organizations aren’t providing the guidance and tools developers need to...