The web application firewall (WAF) is dead, they say, and DevOps is the culprit, found over the body in the server room with a blade in its hand and splattered code on its shirt. But although some could argue that DevOps had the means, motive, and oppo…Read More DevOps didn’t kill WAF, because WAF will never truly die
As modern infrastructures get more complex everyday, DevOps teams have a hard time tracking infrastructure drift. The multiplicity of factors involved when running sophisticated infrastructures turns this situation into a multidimensional headache with…Read More Infrastructure drift: A multidimensional problem with the need for new DevSecOps tools
While there is not one exact industry wide definition, threat modeling can be summarized as a practice to proactively analyze the cyber security posture of a system or system of systems. Threat modeling can be conducted both in the design/development p…Read More What is threat modeling and why should you care?
By Gary Blower, Solutions Architect, Clearvision Whether you view your organisation as having an agile approach or not, in 2020, companies had no choice but to drastically change their way of working as the world rapidly pivoted to remote working. Orga…Read More The Future of Service Management in the DevOps Era
If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies up to date with these new technologies. New security techniques are required in order to keep up with current technology trends, and…Read More Achieve CIS Compliance in Cloud, Container and DevOps Environments
Redgate has released a report which shows some dramatic changes in IT as a direct result of the current pandemic. Nearly three quarters of organizations have now adopted DevOps in some form, cross-platform database use has risen markedly and, significa…Read More Exploring DevOps adoption among database pros
Data breaches are becoming increasingly common, and one factor driving this escalation is the fact that today’s IT systems are integrated and interconnected, requiring login information from multiple parties and services. In response, Amazon Web Servic…Read More Amazon Addresses Best Practice Secrets Management with AWS Secrets Manager
Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today we’d like to offer a straight-forward roundup of the Tripwire product suite. Get to …Read More Tripwire Products: Quick Reference Guide