application security

Unified Security: Connecting Executives and Engineers in Cloud DevSecOps
In today’s rapidly evolving digital landscape, ensuring robust security in cloud DevSecOps is more crucial than ever. Yet, a growing disconnect between executives and frontline “doers” poses significant challenges. Join JFrog and ...

Survey Surfaces Cloud-Native Application Security Challenges
A global survey of 600 DevOps, engineering and security professionals finds more than two-thirds (67%) reporting their organization has delayed or slowed application development as a result of security concerns. Conducted by ...

App Security Testing in Containerized Environments: Tips and Tricks
Development teams should prioritize application security testing, whether their applications are monoliths or containerized ...

AppViewX Unfurls Certificate Life Cycle Management Platform for Kubernetes
AppViewX today launched an automated certificate life cycle management platform for Kubernetes environments ...

Principle of Shared Responsibility in Cloud-Native Applications
Using the cloud means you can focus on your application and use a third party for most of your infrastructure. The cloud provides virtual interfaces that abstract away the details of operating ...

Just-in-Time Permissions in Microservices-Based Applications
In a previous article, we discussed keeping microservices secure, even from themselves. But what else can you do to keep your application free of vulnerabilities that could be exploited by bad actors? ...

Oxeye Delivers CNAST Tool to Better Secure Microservices
At the KubeCon + CloudNativeCon Europe 2022 conference, Oxeye today announced general availability of its Cloud Native Application Security Testing (CNAST) tool to pinpoint vulnerabilities in microservices-based applications. The Oxeye platform requires ...

3 Reasons Teams Struggle to Shift Security Left
It seems like you can’t talk about application security today without mentioning “shifting left.” This phrase refers to bringing security into the ‘left’ side of the software development life cycle and testing ...

4 Pillars of Cloud-Native Security
Many enterprise IT organizations today rely on traditional security policies and tools that were not built to deal with the change, scale and complexity of cloud-native environments. While it’s hard to believe, ...

Kubernetes: The Underpin of UK’s COVID-19 Contact Tracing?
Governments across the world have realized that to get out of lockdowns while also avoiding a “second peak” from COVID-19, testing and contact tracing are critical. Like other European nations, the UK ...