cloud security articles
-
Cloud Security
Crawl, Walk, Run: Operationalizing Your IaC Security Program
You’ve decided to shift your cloud security left. You researched vendors, evaluated solutions, did a proof of concept and now…
-
Cloud Security
How To Prevent the IaC Misconfiguration Snowball Effect
The goal with infrastructure as code (IaC) frameworks such as Terraform and CloudFormation is to make infrastructure provisioning more efficient.…
-
Cloud Security
Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
Developers use secrets to enable their applications to securely communicate with other services. Hardcoding credentials (like usernames and passwords) simplifies…
-
Cloud Security
You Must Comply! Why You Need Proactive Open-Source License Compliance
As vulnerabilities in open-source code continue to play a prominent role in headline-grabbing exploits, such as Heartbleed and Log4Shell, a…
-
Cloud Security
Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
Infrastructure as code (IaC) has fundamentally changed the way we build and manage infrastructure. By transforming cloud resources and their…
-
Cloud Security
Prisma Cloud Provides New Extensive Use Cases for Azure Customers
Microsoft Azure customers can now secure their data and networks and gain broader governance across their cloud assets. Prisma Cloud,…
-
Cloud Security
6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
Container-based application deployment is at its peak, as is the popularity of orchestration platforms like Kubernetes that form the underlying…
-
Cloud Security
9 Essential Infrastructure Security Considerations for Kubernetes
Part of the reason why securing Kubernetes can be challenging is that Kubernetes isn’t a single, simple framework. It’s a…
-
Cloud Security
Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
In this cloud-native world, applications are more assembled than built. Instead of starting from scratch, developers leverage ready-made code components…
-
Cloud Security
Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
When you’re developing a cloud-native web application, it can feel as if you’re building a kingdom. The success of your…
- 1
- 2