Security

Security | News, how-tos, features, reviews, and videos

cloud security ts
CSO  >  An exclamation-mark alert in a field of abstract technology.

micro segmentation security lock 2400x1600

Using OPA to safeguard Kubernetes

Open Policy Agent addresses Kubernetes authorization challenges with a full toolkit for integrating declarative policies into any number of application and infrastructure components

containers

The five best Kubernetes security practices

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

Out of place, in the middle of nowhere: a jet airplane in a dense forest

Cloudops tool integration is more important than the tools themselves

Focus on the features and functions of cloud operations and monitoring tools and you could miss the much larger advantage

ibm cloud native

OPA: A general-purpose policy engine for cloud-native

Open Policy Agent simplifies authorization policy creation and enforcement for distributed applications, Kubernetes, microservices, and much more

10 cloud security breach virtualization wireless

Google Cloud adds security capabilities for sensitive workloads

Confidential VMs, Assured Workloads for Government services are launched

A laptop user wearing a face mask works in a darkened space.

Social engineering hacks weaken cybersecurity during the pandemic

Disinformation, malware, and an array of cyberattacks are rising as fast as case counts

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

Automation  >  An assembly line's robotic arms conveyor belt work with binary code.

10 steps to automating security in Kubernetes pipelines

DevOps teams don’t need to sacrifice the speed of containerized development if they know what can be automated, why it’s important, and how to do it

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

micro segmentation security lock 2400x1600

How secure is Java compared to other languages?

Java is often cited as the most secure programming language. Is it really?

video conferencing / remote work

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

Malware alert  >  United States Capitol Building

Visual Studio Code extension flags NPM vulnerabilities

Open source Snyk Vuln Cost scans JavaScript packages from NPM for security vulnerabilities as you code

help 139994676

Zeek and Jitsi: 2 open source projects we need now

Long proven but not well known, these network security monitoring and video conferencing tools couldn’t be more timely

youtube thumbnails template 021020
video

How to fight scripting attacks

Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.

youtube thumbnails template 021020
video

How to prevent data loss on your network

Use these tools and techniques to protect important data from being exfiltrated from your Windows network.

Load More