
The recent adoption of DevOps has been rapid and widespread while security best practices have been slow to keep pace. It is clear that the transformation has helped organizations improve their velocity and improve their products as they grow.
As cybersecurity risks continue to mount, security best practices must be included in every team's workflow. By understanding and facilitating the cultural shift that DevOps requires, you can help your team work faster and more securely, with sustainable results.
Download our new eBook to learn everything you need to know to start running DevOps securely at scale.
|
|
|
Cloud vs. On-Premises: Understanding the Security Differences
More and more organizations are now entrusting their IT resources and processing to the cloud. This trend is likely to grow in the coming years. To illustrate, Gartner predicts that cloud data centers will process 92 percent of workloads by 2020. Cloud workloads are expected to increase 3.2 times in that same span of time, Cisco forecasts.
|
|
|
|
|
Practical Attacks with DNS Rebinding
One of the tools likely to gain popularity in the wild is DNS rebinding. DNS rebinding is a technique that turns a victim’s browser into a proxy for attacking private networks. Attackers can change the IP associated with a domain name after it has been used to load JavaScript. Since same-origin policy (SOP) is domain-based, the JavaScript will have access to the new IP.
|
|
|
|
|
20 Critical Security Controls: Control 10 – Data Recovery Capabilities
In this blog post, Travis Smith goes over Control 10 from the newly released version 7 of the CIS top 20 Critical Security Controls – Data Recovery Capabilities. He walks through the five requirements and offers his thoughts on what he has found.
|
|
|
|
The State of Security now publishes a daily digest to help you stay informed on all the latest security threats and trends. Save time by letting the best security news and featured content come to you!
|
|
|
|
|