Does security have a place at the DevOps table?

Software Development Methodology

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Microsoft still unlocking its security identity

    Credibility, security… and Microsoft? Trustworthy Computing has improved Windows platform security, but don't expect Microsoft's security teams to put themselves out of business with credibility. 

  • Okopipi leaps in where Blue Security left off

    The new user group is building an open source P2P application that sends spammers automated "unsubscribe" messages. Some call it feasible, but others believe counterattack strategies are doomed to fail. 

  • Security Bytes: Fix available for RealVNC flaw

    In other news, changes may be coming for the Payment Card Industry (PCI) data security standard and Diebold will address security risks in its voting machines. 

  • Oracle refuses to learn its lesson, experts say

    Oracle critics say the database giant sits on known flaws for too long, leaving its applications open to attack. Is it time for infosec pros to extract Oracle products? 

  • Fresh Bagels offer baked-in rootkits

    The prolific worm's latest variants now sport rootkit functionality; one AV firm says most malware may soon include rootkits because attackers won't be able to resist the ROI. 

  • Scientists band together for TRUST-worthy research

    A group of the nation's top computer scientists and colleges are teaming up to find better ways to protect computing systems from cyberattacks. 

  • IBM and friends tout open source ID management

    Big Blue is teaming up with Novell and others on Project Higgins, an open source project to simplify and secure Internet ID management. 

  • RSA Reporter's Notebook: Time to outlaw rootkits?

    A Homeland Security official says rootkits need to go; how your best employees are leaking confidential data; and the end of perimeter security, for better or worse. 

  • Has perimeter security become obsolete?

    Tatu Ylönen, founder of Helsinki, Finland-based SSH Communications Security Corp., developed the Secure Shell protocol in 1995. Today, millions world... 

  • Exploit code targets Windows help system

    Attackers could take advantage of a flaw in Microsoft HTML Help Workshop to cause a buffer overflow or launch malicious code. Exploit code is in the wild.