Applications

What Is Single Sign-On?

Single sign-on (SSO) solutions let an end user log in just once and access all the resources and applications they need.?SSO systems make it easy to authenticate the user on...

DevSecOps Training & Best Practices

  Many thought the term "DevOps" was just another buzzword. But its usage and application have grown to such a degree that it can now be considered part of mainstre...

Container & Kubernetes Security Best Practices

Containers are an increasingly popular way to deploy applications because of the improved efficiency and agility they offer.Container technologies include multiple native se...

How to Control API Security Risks

The enterprise use of APIs (application programming interfaces) is exploding, as more and more businesses embark on digital transformation and look for ways to make money by...

Privileged Access Management (PAM) Meaning

Privileged accounts pose a serious security problem. Anyone who has access to one has the potential to use those administrative privileges to harm your organization in a num...

The IT Security Mistakes that Led to the Equifax Breach

  The Equifax data breach that exposed the sensitive personal information of more than 145 million consumers was one of the worst data breaches of recent years, b...

Spectre and Meltdown Vulnerabilities & Protection

While there is no shortage of data breaches and new exploits in any given year, it's relatively rare for there to be an entirely new class of vulnerabilities to be publicly ...

Privileged Access Management Best Practices

Access to applications, servers and network resources is the cornerstone of enterprise IT, which is all about enabling connectivity. Not every account should have full acces...

With So Many Eyeballs, Is Open Source Security Better?

Back in 1999, Eric Raymond coined the term "Linus' Law," which stipulates that given enough eyeballs, all bugs are shallow. Linus' Law, named in honor of Linux creator L...

What is a Bug Bounty? How to Set Up a Bug Bounty Program

Bugs exist in software. That's a fact, not a controversial statement. The challenge (and controversy) lies in how different organizations find the bugs in their software.One...

Latest articles