We already know that some IT paradigms must be rethought when we look at the world of cloud security. Identity Access Management is one of…
In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to…
In recent years, the use of containers to pack and deliver our applications has become increasingly present in development processes.
OWASP is one of the best sources of knowledge for all professionals who wish to work with software development, and to have a robust…
When we think of a supply chain, a company in the industrial area and its factory receiving its raw materials soon comes to mind. This…
Peter Drucker once said, “That which is not measured, is not improved.” He’s right – what we can’t understand…
In the first part of our article, we talk about the basic concepts of security testing. In this second part, we will deal more directly with…
If we ask any security or development professional if they think that performing security tests on their applications and/or code is…
Talking about immutable infrastructure requires us to go back in time and start by explaining how they were, and in some cases still are…