By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Cloud application security News
September 08, 2017
In TheServerSide's ongoing coverage of developing secure Java software, I spoke recently with Tim Mackey, the IT evangelist for Black Duck Software. The conversation was interesting enough to pull ...
September 01, 2017
There's really nothing new under the sun when it comes to addressing security vulnerabilities in code. While there has been a great shift in terms of how server side application are architected, ...
August 14, 2017
Should you implement a custom user registry to help mitigate access to your various LDAP servers in order to simplify security tasks such as authentication and group association? The answer to that ...
June 22, 2016
At DockerCon 2016, the big trend from exhibitors is the container as a service, creating a smooth path for Docker adoption.
Evaluate Cloud application security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
You would think that managing a sea of containers and microservices would make DevOps security difficult, but it may, in fact, make DevSecOps easier. Continue Reading
When applying DevOps principles, like continuous automation and continuous delivery, many organizations are creating DevOps security vulnerabilities in their public cloud. Continue Reading
DevOps has placed a greater burden on the software developer in terms of securing the public cloud. DevSecOps tools are helping to reduce the DevOps developer's burden. Continue Reading
Manage Cloud application security
Learn to apply best practices and optimize your operations.
As microservices-based applications are deployed to a sea of Docker containers, mitigating against cloud-native security issues is becoming a struggle. Continue Reading
Implementing security for an IoT gateway is challenging. A software developer shares best practices for developing a dynamic and robust security model. Continue Reading
Problem Solve Cloud application security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Here are some strategies to remove plain text passwords from configuration files and your code base. It's one way a secure Java app can deter a malicious attack. Continue Reading