security

Icon of a security padlock over apps on a phone Measuring the Effectiveness of Your Vulnerability Discovery Strategies

Trying to prove an app has no vulnerabilities is fraught with challenges, so teams need to choose appropriate strategies for securing apps and ways of measuring whether the time and money spent searching for vulnerabilities is effective. This means understanding how metrics apply to your specific environment.

Mike Shema's picture
Mike Shema
Security padlock on a fence DevOps and Security: 5 Principles for DevSecOps

With the trend toward a more continuous delivery and deployment process, late-lifecycle activities like security assurance present a significant hurdle to continuously delivering value to customers. DevSecOps addresses this by shifting security assurance activities, personnel, and automation closer to development.

Jeffery Payne's picture
Jeffery Payne
monarch butterfly Monarch Butterfly Flight Inspires Micro Air Vehicles

Studying the biomechanics of the amazing flight of the monarch butterfly will enhance national security. At least that’s the goal of research about the possibilities of long-range micro air vehicles with enhanced flight efficiency and superior flight range inspired by monarch butterflies.

Pamela Rentz's picture
Pamela Rentz
smart city Georgia Tech IoT Study: Takeaways for Smart Cities

The internet of things has sky-high expectations, and smart cities, where devices connect across public and private sectors, is one of the drivers fueling the fervor. But there are also skeptics saying the IoT is slow to materialize, which poses questions about risks surrounding cyber security and privacy.

Pamela Rentz's picture
Pamela Rentz
A man's face in facial recognition software Microsoft Calls for Federal Regulation of Facial Recognition

Microsoft has called for federal regulation of facial-recognition software, arguing that such artificial intelligence abilities are too significant and potentially dangerous for its purveyors to police themselves. The move comes amid public criticism of several tech giants over their use—and misuse—of the technology.

Beth Romanik's picture
Beth Romanik
Person holding a tablet with various API icons 5 Myths about API Security

APIs are designed to provide interfaces between multiple applications, allowing them to work together. From a security perspective, this is a powerful tool to have. Unfortunately, the effectiveness of APIs diminishes if they are misunderstood. Here are five common myths about API security, along with the facts.

Harold Kilpatrick's picture
Harold Kilpatrick
Locks on a red fence, photo by Jon Moore A Definition of Done for DevSecOps

In DevOps, we have a software delivery pipeline that checks, deploys, and tests every build. The goal is to produce a viable candidate for production, so we have to look at many different aspects of quality, including security. To be sure we hit all the crucial marks, we should have a definition of done for DevSecOps.

Gene Gotimer's picture
Gene Gotimer
A computer keyboard lit up red, photo by Taskin Ashiq 6 Ways to Protect Your Organization from DDoS Attacks

During a DDoS attack, no one can use your application, which will result in loss of business. Brand reputation also tumbles if customers can't access your site or become casualties of the data breaches. However, there are some proven practices for preventing DDoS attacks—and for what to do if you fall victim to one.

Pradeep Parthiban's picture
Pradeep Parthiban