Application security April 26, 2023 Nitesh Malviya DevSecOps: Continuous Integration Continuous Delivery (CI-CD) tools In the last piece, we went through the various tools that can be integrated into the DevOps Pipeline to implement security at the different stages of the software...
Application security January 12, 2023 Nitesh Malviya Introduction to DevSecOps and its evolution and statistics Learn about the growth of DevSecOps and key statistics associated with it for 2022.
Application security October 18, 2022 Gina Napier MongoDB (part 3): How to secure data Learn how to secure data in a MongoDB database.
Application security October 6, 2022 Gina Napier MongoDB (part 2): How to manage data using CRUD operations Find out how to manage data in a MongoDB database.
Application security October 4, 2022 Gina Napier MongoDB (part 1): How to design a schemaless, NoSQL database Find out how you can use MongoDB to design a schemaless, NoSQL database.
Application security September 26, 2022 Nitesh Malviya Understanding the DevSecOps Pipeline Learn more about DevSecOps, a DevSecOps Pipeline, the concept of Shift Left, what it is and why the Shift Left mindset is becoming essential.
Application security July 20, 2022 Isla Sibanda API Security: How to take a layered approach to protect your data Learn how a layered approach to API security can help organizations balance cost and efficacy.
Application security March 23, 2022 Ted Harrington How to find the perfect security partner for your company Not all advisors are created equal, so you’ll want to choose carefully and consider a variety of factors.
Application security March 16, 2022 Ted Harrington Security gives your company a competitive advantage When you properly secure your software system and then can prove it, you obtain a competitive advantage that helps you earn trust and win sales.
Application security March 9, 2022 Ted Harrington 3 major flaws of the black-box approach to security testing By understanding the methodology’s three primary flaws, you and your security team can be more effective in protecting your company’s assets.