New & Notable
Enterprise development security News
January 19, 2022
We see examples of the principle of least privilege everywhere in our daily lives. What does the principle of least privilege mean as applied to security in software development and DevOps?
January 08, 2022
Don't let yourself be intimidated by chmod numbers and permissions. Here's a quick and easy to understand explanation of how chmod permission numbers work in Linux.
November 12, 2017
Eariler this year we spoke with Jim Manco of Manicode security. It was immediately prior to Oracle OpenWorld 2017, in which Manico was delivering a JavaOne session on Java SE 9 security. There are ...
October 04, 2017
Engaging speakers like Jim Manico or Ivar Grimstad can make all the difference when choosing a session at a conference like JavaOne 2017 than the session syllabus.
Enterprise development security Get Started
Bring yourself up to speed with our introductory content
Like any framework, Spring Security requires writing less code to implement the desired functionality. Learn how to implement the Spring Security architecture in this book excerpt. Continue Reading
If you're ready to try Jenkins, this quick start tutorial lays out the specific steps you'll need to take to download and install the CI tool on your local machine. Continue Reading
Cryptographic keys help improve security in your enterprise. Consider entropy as a way to safeguard your data and prevent hackers from picking your locks with faulty keys. Continue Reading
Evaluate Enterprise development security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Author Andrew Hoffman explains the importance of a secure web application architecture and how to achieve it through collaboration between software and security engineers. Continue Reading
The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities. Continue Reading
Examine a recent vulnerability to the runC container code and what you need to do to prevent unwanted root access and container manipulation in your computing environment. Continue Reading
Manage Enterprise development security
Learn to apply best practices and optimize your operations.
What Oracle called the Java EE API is now called Jakarta EE API under the Eclipse Foundation. Here's what developers can expect in the Jakarta EE 9 release. Continue Reading
API and web application vulnerabilities may share some common traits, but it's where they differ that hackers will target. Continue Reading
Developers need to be comfortable with their tools to create a strong security model in an organization. Don't overlook these areas or credentials can end up in the wrong hands. Continue Reading
Problem Solve Enterprise development security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Software companies have found alternatives for master-slave terminology to describe their distributed systems. It's time for the rest of the IT world to do the same. Continue Reading
Should developers be privy to the ins and outs of software sales? A strong business relationship can be mighty helpful in this expensive and tedious process. Continue Reading
Enterprise software development is difficult, so it's no surprise to discover there is a high IT project failure rate. Here's how to buck the trend and get yours to succeed. Continue Reading