Containers — which are lightweight software packages that include entire runtime environments — have solved the issues of portability, compatibility and rapid, controlled deployment. Containers include an application; all its…
Browsing CategoryApplication Development
What Is Domain-Driven Design?
In the ever-growing software ecosystem, successful products need to have great performance, security, maintainability and usability. For the people who deliver those products, quality assurance, time to market and cost…
Using the Threat Modeling Manifesto to Get Your Team Going
Secure software development requires a ‘shift left’ — paying attention to security and privacy early in the life cycle. Threat modeling is a very useful activity for achieving this goal,…
Don’t Speed Past Better Cloud App Security
They say you can only have two of three — fast, good and cheap. When it comes to developing cloud-based applications, I think that a fourth criteria should be added:…
Are Current Security Assurance Models Suitable for the Digital World?
With the constantly transforming cyber landscape, intruders are always finding new ways to exploit weaknesses in organizations’ systems and applications. As a result, cyber-related incidents have become one of the…
Do You Know Your Responsibilities When It Comes to Container Security?
As you migrate your enterprise to the public cloud or multicloud, you want to realize some of its inherent benefits regardless of what service model you utilize. Whether your goal…
A Guide to Easy and Effective Threat Modeling
Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. The purpose of threat modeling is to…
How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home
Technology enables employees to work from the office, from home, during their daily commute and pretty much everywhere in between. Companies, however, have little control over security between the home…
6 Steps to Modernize Your On-Premises Identity and Access Management Architecture
The time has come to modernize your on-premises identity and access management (IAM) system. As organizations of all sizes and across industries move data and applications to the cloud, some…
iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps
Apple users of the world, 13 is your lucky number: iOS 13 has arrived! As expected, this new iteration of Apple’s mobile operating system comes with a slew of changes,…