Does security have a place at the DevOps table?

Software Development Methodology

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Oracle refuses to learn its lesson, experts say

    Oracle critics say the database giant sits on known flaws for too long, leaving its applications open to attack. Is it time for infosec pros to extract Oracle products? 

  • Fresh Bagels offer baked-in rootkits

    The prolific worm's latest variants now sport rootkit functionality; one AV firm says most malware may soon include rootkits because attackers won't be able to resist the ROI. 

  • Checklist: Ten dos and don'ts for secure coding

    Download this checklist of dos and don'ts for developing secure code. 

  • Ten dos and don'ts for secure coding

    Security practitioners should understand how developers introduce security vulnerabilities into applications and work to support the developers in improving code quality and security. Encouragement and support for improvement must be a fundamental pa... 

  • Scientists band together for TRUST-worthy research

    A group of the nation's top computer scientists and colleges are teaming up to find better ways to protect computing systems from cyberattacks. 

  • IBM and friends tout open source ID management

    Big Blue is teaming up with Novell and others on Project Higgins, an open source project to simplify and secure Internet ID management. 

  • RSA Reporter's Notebook: Time to outlaw rootkits?

    A Homeland Security official says rootkits need to go; how your best employees are leaking confidential data; and the end of perimeter security, for better or worse. 

  • threat modeling

    Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system... 

  • Has perimeter security become obsolete?

    Tatu Ylönen, founder of Helsinki, Finland-based SSH Communications Security Corp., developed the Secure Shell protocol in 1995. Today, millions world... 

  • Exploit code targets Windows help system

    Attackers could take advantage of a flaw in Microsoft HTML Help Workshop to cause a buffer overflow or launch malicious code. Exploit code is in the wild.