Experts weigh in on the growing availability of DevOps tools and the lessons from enterprises that scaled DevOps.
From secure coding to pen testing, here's how to get your app security house in order.
Is OAuth 2.0 too risky for your organization? Here's a detailed look at the issues you need to understand to decide on authentication protocols.
Lesson from a ransomware attack on one Fortune 100 company: Automation is important not just for building systems but for recovery.
DevOps and security. There's still no standard, or even agreed upon name, but two things are clear: DevOps is here to stay and security must be...
Here is a roundup of best practices from leading security experts to help developers get up to speed on thinking app sec-first.
Passwords may not offer the most secure form of authentication but there are several measures developers can take to make them more robust and...
The distributed database technology behind bitcoin can be cost effective for enterprise applications —but not always.
Security holes in devices and new guidance from DHS are on the agenda at the Security of Things Forum
Limiting the number of keys in the system because the key server can't handle enough is too risky. If you don't believe me, wait until you read...

Pages