Security observability is the ability to gain visibility into an organization’s security posture, including its ability to detect and respond to security threats and vulnerabilities. It involves collecting, analyzing, and visualizing security data to identify potential hazards and take proactive…
Category: InfoWorld Security
ForgeRock, Double Secret Octopus offer passwordless authentication for enterprises
ForgeRock is adding Enterprise Connect Passwordless to its Identity Platform to provide no-code and low-code approaches for enterprises to add passwordless authentication to their IT infrastructure. This article has been indexed from InfoWorld Security Read the original article: ForgeRock, Double…
Tailscale: Fast and easy VPNs for developers
Networking can be an annoying problem for software developers. I’m not talking about local area networking or browsing the web, but the much harder problem of ad hoc, inbound, wide area networking. Suppose you create a dazzling website on your…
ReversingLabs adds new context-based secret detection capabilities
The software supply chain security tool will host new secret detection capabilities through the command-line interface to help developers prioritize remediation efforts. This article has been indexed from InfoWorld Security Read the original article: ReversingLabs adds new context-based secret detection…
GitHub 2FA campaign begins
Following through on a pledge made last year, GitHub on March 13 will begin phasing in two-factor authentication (2FA) requirements for developers contributing code to the popular code sharing site. All developers will be required to comply by the end…
Cloud trends 2023: Cost management surpasses security as top priority
As cloud usage grew over the past decade, one trend among cloud users remained constant: Security held steady as the top challenge for users. That focus is shifting. For the first time, since Flexera began its annual survey of cloud…
Top 10 open source software risks for 2023
While open source software is the bedrock of modern software development, it is also the weakest link in the software supply chain, according to a report by Endor Labs. This article has been indexed from InfoWorld Security Read the original…
At least one open source vulnerability found in 84% of code bases: Report
Almost all applications contain at least some open source code, and 48% of code bases examined by Synopsys researchers contained high-risk vulnerabilities. This article has been indexed from InfoWorld Security Read the original article: At least one open source vulnerability…
Cybersecurity startup Oligo debuts with new application security tech
An Israeli startup targets software code vulnerabilities with advanced agentless filtering technology. This article has been indexed from InfoWorld Security Read the original article: Cybersecurity startup Oligo debuts with new application security tech
EnterpriseDB adds Transparent Data Encryption to PostgreSQL
Relational database provider EnterpriseDB on Tuesday said that it was adding Transparent Data Encryption (TDE) to its databases, which are based on open-source PostgreSQL. TDE, which is used by both Oracle and Microsoft, is a method of encrypting database…
3 reasons not to repatriate cloud-based apps and data sets
Repatriation seems to be a hot topic these days as some applications and data sets return to where they came from. I’ve even been tagged in some circles as an advocate for repatriation, mostly because of this recent post. Once…
The tech leader’s guide to 2023
Recently, I had the opportunity to ask over a dozen leading technologists for their hopes, predictions, and guidance for the year 2023. This article distills the far-ranging conversation and wealth of insight that came back to me. The year ahead looks…
How multicloud changes devops
Devops or devsecops (I’ll use devops for this post) is more than just a fast way to build and deploy software within the cloud and on traditional systems. It’s now a solid standard, with best practices, processes, and widely accepted…
C++ creator Bjarne Stroustrup defends its safety
The creator of C++, Bjarne Stroustrup, is defending the venerable programming language after the US National Security Agency (NSA) recently recommended against using it. NSA advises organizations to use memory safe languages instead. Responding to the agency’s November 2022 bulletin…
C++ creator Bjarne Stroustrup defends its safety
The creator of C++, Bjarne Stroustrup, is defending the venerable programming language after the US National Security Agency (NSA) recently recommended against using it. NSA advises organizations to use memory safe languages instead. Responding to the agency’s November 2022 bulletin…
Canonical security subscriptions for Ubuntu Linux now available
Canonical’s Ubuntu Pro, a Linux security maintenance subscription service covering thousands of applications and toolchains in the open-source ecosystem, is generally available as of January 26. Released in beta in October, Ubuntu Pro helps users of Linux desktops and servers…
Ubuntu Pro security subscriptions for Linux now available
Canonical’s Ubuntu Pro, a Linux security maintenance subscription service covering thousands of applications and toolchains in the open-source ecosystem, is generally available as of January 26. Released in beta in October, Ubuntu Pro helps users of Linux desktops and servers…
Researchers warn of malicious Visual Studio Code extensions
Can developers trust extensions downloaded for Microsoft’s popular Visual Studio Code editor? Researchers at Aqua Nautilus say they have found that attackers could easily impersonate popular extensions and trick unknowing developers into downloading them. Some extensions may already have taken…
Informatica to lay off 7% of its workforce to cut costs
The decision to lay off 450 staffers globally is expected to better align the company’s workforce to its cloud-focused strategic priorities and cut costs to suit current business needs, Informatica said in a statement. This article has been indexed from…