Posts Categorized: Security

Five Best Practices to Achieving a Secure DevOps Model

The first article in our two-part series introduced the concept of a “whole brain” approach to achieving secure DevOps. This article continues the discussion by taking a closer look at the five best practices every organization should implement to achieve a secure DevOps model. Designing a “whole brain” approach to SecDevOps is challenging, but not…

Read More

2018 in Review: The Top Four Takeaways in Security

Our last blog of 2018 takes a closer look at four critical security developments and trends … and how we can apply to improve security and compliance in 2019. Whether you’re looking for a better way to manage the inevitable breach, comply with an increasingly complex landscape of data privacy regulations, or determine how you…

Read More

Why a “Whole Brain” Approach to Secure DevOps Is Critical

To be confident that their applications and associated data are protected from the start of development, organizations need to take a holistic view to the concept of Secure DevOps by addressing security considerations upfront during planning and development. Now there’s a way to let right-brain application developers and left-brain security teams focus on what they…

Read More

Five Tips to Secure DevOps

A first article examined DevOps and questioned why security usually isn’t added early enough in application development processes, and as a result, lead to application and data security becoming an afterthought. In this second article, we look at new recommendations and specific best practices companies should consider to make current DevOps methodologies more secure, by creating…

Read More

Evolve or Die: Integrate Security into Application Development Processes

While the benefits of the DevOps methodology are well understood, as an industry we haven’t done enough to add security earlier in the application development process. In the first of a two-part blog series, we take a look at why this challenge exists, the risks it presents, and its overall business impact. Stay tuned for…

Read More

Security Challenges Related to Containers

The use of containers has become integral to application development processes. The trend shows no sign of slowing down, but it raises new security challenges. As is the case with so many technologies, containers were not created with security in mind. In this article, we take a closer look at these container security issues, why…

Read More

The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

Given the market success and flexibility of the vSAN and NSX solutions, VMware enables partners to provide additional capabilities – like security. One key observation from the recent VMworld 2018 conference, is that Security-in-Depth needs to become the de facto approach for security. Continue reading this article to learn more about the Security-in-Depth model and…

Read More

How-to Guide: Successfully Complying with Data Privacy Regulations.
Download Now