Does security have a place at the DevOps table?

Software Development Methodology

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Insider edition: Web application security

    Developers building Web applications don’t give enough consideration to security. Often in a rush to get apps live, they’re pushed into production with glaring vulnerabilities that attacks can easily exploit, often in an automated manner. This Inside... 

  • Managing identities in hybrid worlds

    The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based IDaaS for hybrid cloud infrastructures, and mobile devices that are either an authentication token in ... 

  • Technical guide to secure development practices

    When security practitioners attempt to introduce secure development practices into a development process and organization, they are typically less than accepted. Development organizations tend to reject formal internal structure and process imposed f...