Infrastructure as Code (IaC) is a key DevOps practice that bolsters agile software development. In this report, we identify security risk areas in IaC implementations and the best practices in securing them.
Mark Liggett, CEO of Liggett Consulting and longtime IT and cybersecurity key player, sits down with Trend Micro to share his thoughts on the importance of taking into account connectivity and visibility in securing WFH setups.
The internet of things (IoT) landscape will be critically affected by the recently discovered Ripple20 vulnerabilities. This group of 19 bugs could potentially hit millions of IoT devices across many different industries.