How can security and application development teams work more closely together to enhance cybersecurity? A panel of experts discusses critical security issues, including the role of microservices.
"The PCI DSS security requirements apply to all system components included in or connected to the cardholder data environment."
The cardholder data environment (CDE) is comprised of people, processes and technologies that store, process or transmit cardholder data or sensitive authentication data. "System...
Kubernetes has become the de facto operating system of the cloud. This rapid success is understandable, as Kubernetes makes it easy for developers to package their applications into portable microservices. However, Kubernetes can be challenging to operate. Teams often put off addressing security processes until they...
Contact-tracing apps are continuing to take shape around the world as the COVID-19 pandemic continues. Using privacy-by-design principles is critical to building trust in these apps, says privacy expert Ann Cavoukian.
DevOps is the leading way to develop, deliver and support applications. Businesses that adopt DevOps move faster and are better able to keep up with customer demands. But creating an agile, responsive, data-driven culture and processes is easier said than done.
Download your copy of The Road to DevOps Success to...
Based on a survey of cybersecurity and application-development professionals, this e-book examines the dynamics between development teams and cybersecurity teams regarding the deployment and management of application security solutions. Many industry verticals are represented, including manufacturing, financial...
It's a myth that organizations with legacy systems cannot implement DevSecOps, says Md.Mahbubul Alam Rafel, head of information security at Prime Bank in Bangladesh.
Application container technology is revolutionizing app development, bringing previously unimagined flexibility and efficiency to the development process. A good monitoring solution is necessary for dynamic, container-based environments to unify container data with other infrastructure data - only then can you gain...
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
Over the past years, Cybersecurity has evolved from a technical challenge for the IT Security Division of businesses to a major concern for business leaders.
Cybersecurity incidents cause massive damage to organizations from small businesses to global leaders. Understanding the current status of attacks across the...
Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it's important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that...
As your org progresses through its DevOps journey, what are the best practices that successful teams use that you should follow? Puppet and Splunk surveyed more than 3,000 participants and the findings reveal a set of core DevOps practices that are critical for success. Discover what separates successful DevOps teams...
The number of reported vulnerabilities found in open source software more than doubled in 2019 to almost 1,000, with projects such as Magento, GitLab, and Jenkins posting the largest increases, according to security firm RiskSense.
The identity and access management strategy for the remote workforce should ensure contextual authentication to establish the credentials of the users, apply risk-based authentication for measuring user risk profiles, and establish a multifactor authentication mechanism, a panel of experts says.
DevSecOps is in its "awkward teenage years," says Matthew Rose of Checkmarx. But with new tooling and automation - particularly application security testing tools - he sees the practice maturing quickly and delivering improved outcomes.
In an interview with Information Security Media Group's Tom Field, Rose...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.