As featured in:
Daily Briefing > V10 Issue 26
February 9, 2021
The CyberWire
John Petrik
The 2021 State of DevSecOps Report: Drivers and Challenges
Download Now
Learn about the state of DevSecOps in 2021
Most Recent Articles

Containers are transforming how businesses deploy and use applications. Find out how you can defend your business against common container security risks.

When penetration testing in Agile, yearly is not enough. Learn how continuous penetration testing leads to cost savings, time savings, and more secure software.

SD Elements is now available in the U.S. DoD Platform One Iron Bank repository which contains authorized container images hardened to the department’s exacting specifications.

What secures (or fails to secure) your business does not depend on written policies. It depends on what your development team is doing day in and day out.

Your security and development teams should know how to identify and mitigate TOCTOU vulnerabilities. Learn why, and learn how, to test for them in this new book.

A conversation with Steven Patterson about his eBook, which teaches red team testing professionals how to start building Command and Control tools in C++.

In our survey, we found a rising trend toward the adoption of DevSecOps over the last year.

To stay secure while embracing the cloud, your organization will need a security program that takes into account the differences between cloud and traditional security.

2020 upended security strategies and IT roadmaps. Our team identified five cybersecurity trends that will influence security and business priorities moving ahead.

CMMC is a means of unifying cybersecurity standards for the U.S. Department of Defense. Learn how you can achieve compliance with this new standard.

Learn how penetration testing can help healthcare providers resist attacks from Ryuk Ransomware, keep patient records secure, and provide uninterrupted care.

Attackers are following the trajectory of software development and have their eyes on APIs. Regularly testing the security of your APIs reduces your risk.

Security testing has increased considerably over the past decade. But are vulnerability scanners enough to ensure software security?

Ask these five questions to find a penetration testing provider that both satisfies your technical needs and works in harmony with your business.

Moving applications from on-premise to SaaS brings a different set of risks. First among those is the fact that users data is stored in the SaaS provider's data center.

This Cybersecurity Awareness Month, take time to consider all the devices you have online. These 10 tips will help you create or strengthen your IoT security plan.

Businesses who conduct Red Team exercises have reduced costs when a data breach occurs.

Cloud adoption has gone mainstream. Taking full advantage of the benefits takes planning, skill, and a careful weighing of cloud security risks.

Securing a hybrid cloud environment can be challenging, but these best practices will help businesses minimize risk while taking advantage of the benefits.

Zero trust essentially involves changing the approach toward securing our systems and infrastructure. Read more to learn how you can prevent data breaches with this approach.