Shift left security: how to make development and security work together effectively
The so-called “shift left” approach to software security is no longer just an added value but, today, represents a specific expectation and a specific need…
DevOps
Vulnerability assessment and penetration testing. The most prevalent enterprise attacks in 2024
In a cybersecurity strategy, identifying weaknesses in one’s IT infrastructure is a critical step in putting adequate protection in place. Typically, this involves two activities…
DevOps
Backdoors in computing: how to prevent attacks on open source software
In the world of computer security, a recent event highlighted hidden vulnerabilities in the software we use every day. Andres Freund, a developer at Microsoft,…