Security | News, how-tos, features, reviews, and videos
Why we must use a zero-trust security model in microservices and how to implement it using the Kuma universal service mesh.
How Open Policy Agent allows developer teams to write and enforce consistent policy and authorization across multicloud and hybrid cloud environments
Adversarial attacks are one of the greatest threats to the integrity of the emerging AI-centric economy.
How to improve dependency management by ‘shifting security left’ and providing developers with a unified CI/CD pipeline
The Grant Negotiation and Authorization Protocol would replace the browser-oriented OAuth with a more general authorization framework with more security features
Cloud security has been better than on-premises security for several years now. Increased automation and interoperability will cement its position as a best practice.
How companies like Netflix, Pinterest, Yelp, Chef, and Atlassian use OPA for ‘who-and what-can-do-what’ application policy
IBM Cloud Continuous Delivery’s Code Risk Analyzer scans Python, Node.js, and Java source code in Git repositories for security and legal risks
Now that operational best practices for cloud computing are well known, why do mistakes keep piling up?
You may think you know everything about the proper configuration of a cloud computing solution, but cloud providers are keeping a few things to themselves.