cloud security
-
Cloud Security
6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
Container-based application deployment is at its peak, as is the popularity of orchestration platforms like Kubernetes that form the underlying…
-
Cloud Security
9 Essential Infrastructure Security Considerations for Kubernetes
Part of the reason why securing Kubernetes can be challenging is that Kubernetes isn’t a single, simple framework. It’s a…
-
Cloud Security
Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
In this cloud-native world, applications are more assembled than built. Instead of starting from scratch, developers leverage ready-made code components…
-
Cloud Security
Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
When you’re developing a cloud-native web application, it can feel as if you’re building a kingdom. The success of your…
-
Cloud Security
Building the Business Case for DevSecOps
“Resistance to change is proportional to how much the future might be altered by any given act.” — Stephen King…
-
Cloud Security
What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
Cloud-first computing has taken the tech world by storm, and for good reason. Cloud native infrastructure gives developers and organizations…
-
Breaches
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
Nov 27, 2025Ravie LakshmananRansomware / Cloud Security Gainsight has disclosed that the recent suspicious activity targeting its applications has affected…
-
Cloud Security
Crawl, Walk, Run: Operationalizing Your IaC Security Program
You’ve decided to shift your cloud security left. You researched vendors, evaluated solutions, did a proof of concept and now…
-
Cloud Security
How To Prevent the IaC Misconfiguration Snowball Effect
The goal with infrastructure as code (IaC) frameworks such as Terraform and CloudFormation is to make infrastructure provisioning more efficient.…
-
Breaches
Enterprise Credentials at Risk – Same Old, Same Old?
Nov 07, 2025The Hacker NewsData Protection / Cloud Security Imagine this: Sarah from accounting gets what looks like a routine…
- 1
- 2