On the Marriage of SecOps and DevOps

With the rise of DevSecOps, we get to truly redefine how operations, engineering, and security can be brought together...

Three Steps to Adopting a DevOps Unicorn Security Strategy

DevOps unicorns may be a rare breed today, but that doesn’t mean they’ll continue to be in the future. Even if...

On Security Automation for DevOps

Your operational tools deliver continuous monitoring and alerting — why doesn’t your security suite? As...

DevOps Unicorns: Achieving Speed and Security

What if your company is simply a workhorse, trying to subsist on a traditional organizational structure and legacy...

DevSecOps: The Marriage of SecOps and DevOps

With the rise of DevSecOps, we get to truly redefine how operations, engineering, and security can be brought together...

On Security Fundamentals for DevOps

There are always learning curves and initial obstacles when making fundamental changes to your daily security practices...

Federal Government Cloud Security Evolution

In 2011, former federal CIO Vivek Kundra set the stage for federal government agencies to take full advantage of the...

DevSecOps: How IT and Dev Will Finally Stop Fighting

IT and software development, departments that have historically had a somewhat contentious relationship, are on a...

Security Automation for DevOps

Cloud environments undergo dramatic changes during deployments, auto-scaling events, and through natural...

AWS Security Best Practice #10: Watch World-Readable and Listable S3 Bucket Policies

S3 has been around for quite some time. It may be the oldest Service in the ever expanding Web Services provided by...

Cloud Security Requires New Tools and Mindsets

Mainstream security strategies and controls were already struggling to keep up with the rapidly evolving threat...

Security Fundamentals for DevOps Shops

Applying DevOps principles to security operations is not a one-time practice or a stand-alone process — it’s a whole...