security

DevOps

Shift left security: how to make development and security work together effectively

The so-called “shift left” approach to software security is no longer just an added value but, today, represents a specific expectation and a specific need…
DevOps

Vulnerability assessment and penetration testing. The most prevalent enterprise attacks in 2024

In a cybersecurity strategy, identifying weaknesses in one’s IT infrastructure is a critical step in putting adequate protection in place. Typically, this involves two activities…
DevOps

Backdoors in computing: how to prevent attacks on open source software

In the world of computer security, a recent event highlighted hidden vulnerabilities in the software we use every day. Andres Freund, a developer at Microsoft,…