Application Security | News, how-tos, features, reviews, and videos
Explore related topics
Every day, software developers implicitly trust software packages, container images, dependency maintainers, repository operators, and build systems that we don’t know anything about. It’s the opposite of Zero Trust.
Identity, trust, and trust sharing are indispensable to our belief in the validity of the services we interact with on the internet.
The Okta developer advocate and JHipster evangelist discusses Java and JavaScript development, monoliths and microservices, software scaling vs. people scaling, and making security friendlier for developers.
Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.
GitHub’s supply chain security features including the advisory database, Dependabot alerts, and dependency graph are now available for Rust Cargo files.
Security zones keep your applications and their data safe from bad actors and can help limit the impact of a security breach.
The vast metaverse will also be vast in terms of code, accelerating the demand for supply chain security, automated scanning and testing, and continuous updates.
Businesses often lack critical insights into the security of their cloud environment. Here are nine questions business leaders need to ask—and cloud security teams need to answer.
Cloud security is all about configuration. Here’s how to make sure the configurations of your cloud resources are correct and secure, and how to keep them that way.
Handled appropriately, low-code development tools pose no additional security risk over any other platform, system, or development environment.