The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.


Top 10 DevSecOps best practices for building secure software

Ready to transition your organization to DevSecOps but unsure of where to begin? Get started with our top 10 DevSecOps best practices. By: Sneha Kokil, associate principal consultant, and Arvind Balaji, associate principal consultant, at Synopsys. While the software industry celebrates a decade of DevOps, there’s an increasing drive toward adopting DevSecOps and making security a part of software from early on.

Ask SME Anything: What are the major transformations behind SASE architecture?

In this episode of Ask SME (Subject Matter Expert) Anything, Netskope’s Michael Ferguson explains the origin of SASE and how it is changing the way we look at data and cloud security. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Pull Requests for Infrastructure Access

Making frequent changes to cloud applications running in production is the de-facto standard. To minimize errors, engineers use CI/CD automation, techniques like code reviews, green-blue deployments and others. Git pull requests often serve as a foundational component for triggering code reviews, Slack notifications, and subsequent automation such as testing and deployments. This automated process enforces peer reviews and creates enough visibility to minimize human error.


Device management blind to 125 percent increase in financial sector phishing attacks

As guardians of valuable monetary assets and highly sensitive data, financial institutions are the perfect target for cybercriminals. According to IBM, the financial services sector was the number one target of cyberattacks in 2020 among all industries. This means these organizations continue to be challenged and invest heavily in both people and technology to make sure they can withstand attacks of any type.