25 Results

Articles List

2 min. read

Created in 2013 by the MITRE Corporation, MITRE ATT&CK® (Adversarial Tactics, Techniques, and Common Knowledge) is a cyber threat intelligence knowledge base. As a non-profit operator of six fede...

3 min. read

The foundation of cloud-native application development includes serverless computing, containerization, and microservices. Serverless architecture allows DevOps teams to build and run applications wit...

4 min. read

Containerized applications, or the idea of isolating environments, isn’t new. However, the evolution of cloud-native applications, the use of microservices, and the needs of DevOps have made contain...

3 min. read

Security was always intended to be integral to DevOps rather than becoming a part of the final phase in the SDLC. Today’s focus on cloud-native apps, containers, open-source software, and microservi...

3 min. read

The attraction to serverless functions is making developers very happy. Considered a microservice, serverless functions enable a modular design where event-driven independent pieces of code work toget...

3 min. read

As a cloud-native approach, containers have become widely adopted because they enable software developers to respond to the demands of frequent updates, iterative SDLCs, and emerging market opportunit...

3 min. read

Infrastructure as Code (IaC) and Configuration Management (aka ConfigMgmt or Configuration as Code) reflect two sides of the software development coin. IaC automates the creation of a software environ...

Featured Articles

Cloud Workload Protection

What is CWPP in Cloud-Native Security?

3 min. read

Organizations are in the midst of their own cloud transformation. Some are cloud-first or use a hybrid environment, while many are moving toward cloud...

Read more

Cloud Security Posture Management

What is CSPM in Cloud-Native Security?

3 min. read

Cloud adoption has created a need for more specific and dynamic cloud security solutions. As organizations engage in multi-cloud, cloud-native environ...

Read more

Monitoring & Observability

What is Meant by Full Stack Observability?

4 min. read

Cloud-native, multi-cloud, and distributed environments and containerized, microservice-dependent applications rely on more interactions and interdepe...

Read more

Monitoring & Observability

What is Cloud Security Monitoring?

3 min. read

Cloud use is becoming ubiquitous with cloud-native applications, cloud-based APIs, and multi- and hybrid-cloud environments. Tapping into these modern...

Read more

Monitoring & Observability

What are the Three Pillars of Observability?

3 min. read

DevOps teams use observability tools to help them debug applications, uncover root causes of system issues, or follow resource activity to determine m...

Read more

Code & API Security

What is Software Composition Analysis?

4 min. read

Software Composition Analysis (SCA) is a technique used to evaluate software components and the security vulnerabilities that they may bring to an app...

Read more

Code & API Security

What is the SLSA framework?

4 min. read

Safeguarding software that relies on third-party components and services has heightened vulnerabilities. It is advantageous for software teams to embr...

Read more

Cloud Workload Protection

What are SAST and DAST Scans?

3 min. read

Production code typically includes at least one security issue that prompts DevOps and DevSecOps teams to use application security testing methods. Tw...

Read more