Content added to Folio

DevOps Resource Center

Technical how-tos and best practices to help you integrate security into your DevOps pipeline

Add Filters
Filter by:
Common Cloud-Native Security Misconfigurations & Fixes
준수

Common Cloud-Native Security Misconfigurations & Fixes

Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

September 30, 2022

Attack Vector vs Attack Surface: The Subtle Difference

To establish a better security posture, you must address vulnerabilities in your attack vectors and surfaces. While these terms are similar, they’re not the same. This article explores key differences between the two, helping you make your system more secure.

Expert Perspective Feb 01, 2023

Save to Folio

Expert Perspective Feb 01, 2023

Save to Folio

Dependency Mapping for DevSecOps

Discover the importance of dependency mapping and best practices for successful dependency management

Best Practices Jan 25, 2023

Save to Folio

Best Practices Jan 25, 2023

Save to Folio

TLS Connection Cryptographic Protocol Vulnerabilities

TLS is the backbone of encryption and key to ensuring data integrity, but its misconfiguration can leave your system vulnerable. Read on to discover how to secure your TLS connection and arm your organization against malicious attacks.

Best Practices Jan 20, 2023

Save to Folio

Best Practices Jan 20, 2023

Save to Folio

Cloud Native

An in-depth HTTP Strict Transport Security Tutorial

HSTS is an Internet standard and policy that tells the browser to only interact with a website using a secure HTTPS connection. Check out this article to learn how to leverage the security of your website and customers’ data and the security benefits you’ll gain from doing so.

Expert Perspective Jan 11, 2023

Save to Folio

Expert Perspective Jan 11, 2023

Save to Folio

Cloud Native

When and How to Use AWS Graviton

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

How To Dec 22, 2022

Save to Folio

How To Dec 22, 2022

Save to Folio

Network Security

Protect Your Network with Zero-Day Threat Protection

Explore the world of zero-day threats and gain valuable insight into the importance of proactive detection and remediation. Learn how Trend Micro™ Research mitigates risk by providing global cybersecurity intelligence to continuously discover the ever-changing attack surface, understand and prioritize vulnerabilities, detect and rapidly respond to threats, and apply the right security at the right time.

Expert Perspective Dec 09, 2022

Save to Folio

Expert Perspective Dec 09, 2022

Save to Folio

Cloud Native

Why Chaos Engineering is a Good Stress Test Strategy

Learn about chaos engineering, a method of resilience testing that intentionally introduces “chaos” into a system to discover vulnerabilities and weaknesses that can be exploited by attackers.

Expert Perspective Dec 02, 2022

Save to Folio

Expert Perspective Dec 02, 2022

Save to Folio

Cloud Native

How the MITRE ATT&CK Framework Enhances Cloud Security

Upgrade your cybersecurity game with MITRE ATT&CK™. Discover how this framework can help you protect your business—now and in the future.

How To Nov 24, 2022

Save to Folio

How To Nov 24, 2022

Save to Folio

Network Security

Will Cloud-Native Network Security Oust Firewalls?

Security threats have already begun to outpace cloud firewalls. It’s a fact. But organizations exploring new cloud-native solution find themselves more prepared to stay resilient. Find out how cloud-native network security’s features and benefits are making this possible.

Best Practices Nov 16, 2022

Save to Folio

Best Practices Nov 16, 2022

Save to Folio

Container Security

Are Containers Affected by OpenSSL Vulnerabilities?

Find out if your container-based applications are vulnerable to the new OpenSSL vulnerabilities and the recommendations to help ensure you are protected.

Expert Perspective Nov 07, 2022

Save to Folio

Expert Perspective Nov 07, 2022

Save to Folio