Content added to Folio

DevOps Resource Center

Technical how-tos and best practices to help you integrate security into your DevOps pipeline

Add Filters
Filter by:
Best Practices for Keeping Amazon S3 Buckets Secure
AWS

Best Practices for Keeping Amazon S3 Buckets Secure

Explore best practices for the five key areas of cloud storage security and gain insight into locking down your data to prevent breaches, identifying and reacting quickly to any breaches that do occur, and preventing similar breaches in the future.

March 09, 2022
Network Security

Simplify with Network Security as a Service (NSaaS)

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

How To Sep 23, 2022

Save to Folio

How To Sep 23, 2022

Save to Folio

Cloud Native

Top 5 CNAPP-Solved Security Challenges

Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves.

Best Practices Sep 15, 2022

Save to Folio

Best Practices Sep 15, 2022

Save to Folio

Conformity

CIEM vs CWPP vs CSPM

This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.

Expert Perspective Sep 08, 2022

Save to Folio

Expert Perspective Sep 08, 2022

Save to Folio

Cloud Native

Top 5 Cloud Security Trends from AWS re:Inforce 2022

With the industry changing so rapidly, it is often hard to keep up with what is new in cloud security, so we thought we would put together a list of the top five cloud security trends we found during AWS re:Inforce 2022.

Expert Perspective Sep 02, 2022

Save to Folio

Expert Perspective Sep 02, 2022

Save to Folio

Serverless Security

Unlocking Serverless with AWS Lambda and IAM

Learn how Lambda and IAM unlock the power and versatility of the cloud by implementing a serverless User API that can be expanded on as you grow and explore the many services on AWS.

How To Aug 25, 2022

Save to Folio

How To Aug 25, 2022

Save to Folio

Container Security

Detect Threats with Runtime Security

With the increasing use of multi-cloud infrastructure services security has become more complex. You need simplified security for your cloud-native applications with advanced container image scanning, policy-based admission control, and container runtime protection.

Best Practices Aug 16, 2022

Save to Folio

Best Practices Aug 16, 2022

Save to Folio

Cloud Native

Event-Driven Architectures & the Security Implications

This article explores event-driven architecture (EDA) with a detailed definition and explains how EDA offers many essential benefits to developers. It concludes with an outline of some best practices for mitigating security concerns.

Expert Perspective Aug 12, 2022

Save to Folio

Expert Perspective Aug 12, 2022

Save to Folio

Conformity

Well-Architected Framework: Sustainability

One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability.

Best Practices Aug 05, 2022

Save to Folio

Best Practices Aug 05, 2022

Save to Folio

Network Security

Transport Layer Security (TLS): Issues & Protocol

Although Transport layer security (TLS) provides enhanced security, cybercriminals have become increasingly savvy, finding ways to circumvent many of these protections. Learn how malicious actors exploit vulnerabilities within TLS to introduce new forms of malware.

Expert Perspective Jul 28, 2022

Save to Folio

Expert Perspective Jul 28, 2022

Save to Folio

Cloud Native

Top 5 Infrastructure as Code Security Challenges

Learn how to counteract the top five challenges of IaC and discover how these obstacles pose a threat to security and gain valuable insight in how to mitigate these risks.

Best Practices Jul 15, 2022

Save to Folio

Best Practices Jul 15, 2022

Save to Folio