Top 10 secure coding practices

DevOps involves integrating development, testing, deployment, and release cycles into a collaborative process. Security is often considered an afterthought, to be inserted just before release. Having the forethought to integrate security throughout the DevOps cycles is known as DevSecOps; and it involves intelligence, situational awareness, and collaboration; secure coding, deployment and management. Always follow to … Read more

How to create Security Requirements

Software Engineering, ensuring security from the beginning of the software development process is essential. By establishing security requirements, you safeguard the end product against potential threats. Here is a guide on creating security requirements for your software project and when this should occur. 1. Understanding the Importance of Security Requirements Security requirements define the necessary … Read more

Foundations of Cloud Security

Security empowers innovation. If you put security first, everything else will follow. Designing for security is pervasive throughout the cloud infrastructure that services run on. This is vital to adopt a foundations of cloud security at the first steps of your cloud journey. Security is always paramount! Countless companies and governments have lost data because … Read more

Security Logging in the Application Development Lifecycle

Security logging is a fundamental aspect of application development that safeguards our software against threats and vulnerabilities. Let us explore the significance of security logging in the application development lifecycle, where it should be implemented, what information should be logged, and why it is essential for the security and integrity of your applications. Why is … Read more

Explore, compromise and harden Kubernetes pods

By default, many container services run as the privileged root user. Every container is just a running process. Preventing root execution by using non-root containers (configured when the image is built) or a rootless container engine (some container engines run in an unprivileged context rather than using a daemon running as root; for example, podman) limits the … Read more