Security

Security | News, how-tos, features, reviews, and videos

cloud security data breach crime accessible
Tech Spotlight   >   Cloud [IFW / Overview]   >   Clouds reflected in a towering modern skyscraper.

Cybersecurity  >  A mysterious and intricate padlock with complex circuits

Complexity is the biggest threat to cloud success and security

Just when we thought cloud computing could take a post-pandemic victory lap, we now face the largest challenge to date.

Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

Go fuzz to catch hard-to-find bugs in Go

Native Go fuzz testing tool is now ready for beta testing but won’t be included in upcoming release of the language.

A hand reaches to activate controls marked with gear icons [ process / update / fix / automate ]

Is it possible to automate all of cloud operations?

As automation gets better and humans withdraw from the process, we could achieve almost 100% automation of cloudops and secops in just a few short years.

woman with hands over face mistake oops embarrassed shy by marisa9 getty

Most cloud security problems breathe

Humans are more of a problem for cloud security than we think. Here’s how to deal with the walking, talking risks to cloud data theft.

job growth promotion success balloon ladders

What ‘cross-cloud’ architects need to know

As the cloud computing space evolves, the necessary skills do, too. Understanding multiple clouds, security, and governance are the tip of the iceberg.

Man in green shirt jumping up in the air

ProxyJump is safer than SSH agent forwarding

ProxyJump forwards the stdin and stdout of the local client to the destination host, allowing us to set up jump servers without giving them direct SSH access.

cloud security lock

In search of good cybersecurity

With the rise of international threats, enterprises and governments are finally understanding that the most effective information security is in the public cloud.

3 keychain keys

7 keys to selecting a low-code platform

These platforms offer great potential, but capabilities vary widely. Take time to study the options.

CSO  >  An exclamation-mark alert in a field of abstract technology.

Don’t migrate your problems to the cloud

Many look to cloud computing as the way to fix issues with data and systems, but migrating an existing problem may not be in your best interest.

covering his eyes bu004744 100266305 orig

When not to use edge computing

Enterprises are pushing the edge—edge devices, edge clouds, local systems on the edge. Proceed with your eyes wide open.

uh oh oops mistake it malfunction blunder ben franklin bby dny59 getty 175531215

3 cloud architecture mistakes we all make, but shouldn’t

Are we getting good at cloud architecture, or do we still have a lot to learn?

data security / padlock / binary code / digital display

What is unified policy as code, and why do you need it?

By decoupling policy from applications, policy as code allows you to change the coding for policy without changing the coding for apps. Translation: reliability, uptime, and efficiency.

security threat / hacker / attack

The cloud attack you didn’t see coming

If stealth hacking hasn’t already come to cloud computing, it will shortly. Protect yourself by knowing your responsibilities and using effective tools.

cloud security ts

The pandemic-driven rush to cloud is compromising security

COVID-19 has been a boon for cloud computing. However, the haste to move to cloud is causing some enterprises to neglect security. Here’s what you need to look out for.

Admission tickets in an digital network / access / admittance / authorization / authentication

Authorization is the next big technical challenge

Oso’s CEO says authorization will be the next layer of software to be abstracted and made less onerous for developers. If you ask developers, it can’t happen soon enough.

crash test dummies

Google’s OSS-Fuzz extends fuzzing to Java apps

Google’s open source fuzz testing project draws on Code Intelligence’s Jazzer to add support for Java and other JVM languages.

Tech Spotlight   >   Cybersecurity [IFW]   >   Hands at a keyboard with binary code on the display.

6 security risks in software development and how to address them

Experts share how software development teams can ‘shift security left’ and improve governance of using open source components, managing code, deploying services, and handling data.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

Load More