Entries Written By Sylvain CORDIER
What is IAST ( Interactive Application Security Testing)
IAST (Interactive Application Security Testing ) is a term for tools that combine the advantages of SAST (Static Application Security Testing and DAST ( Dynamic Application Security Testing ). As a generic term, IAST tools can differ greatly in their approach to testing web application security. We will explain how these testing tools came about, how they detect security …
Why Kubernetes is a must learn to become Cloud Native
The term “Cloud Native” has been in circulation for a while, and it’s known as a term that encompasses the various tools and techniques needed by software developers to scale, build, deploy and maintain cloud applications. There are different, and many definitions given to what cloud native is in the tech world. But one way …
What is Zero Trust Security?
Zero Trust is a security model based on maintaining strict access controls and not trusting anyone by default. Corporate IT has the affinity to trust every session originating from within the organization while denying anything coming outside of the organization. The problem is once somebody is inside the network, there is no way to stop them. …
NIST’s DevSecOps guidance: This is what you should know
The NIST DevSecOps guide publication critically highlights technical security rudiments for industry-level DevSecOps integrating with cloud-native applications based on microservices. Cloud adoption has crept into the deeper interests of decision-makers at the US government. Cloud adoption is moving rapidly, and although government bodies had a reasonably good grasp of it before, they are now moving …
10 Kubernetes Security Best Practices
Kubernetes security is critical throughout the life of the container due to the dynamic and distributed nature of a cluster. For a cluster to be considered effective and stable, it needs to be secure from unauthorized changes. Use Kubernetes Role-Based Access Control (RBAC) This feature has been available since Kubernetes 1.6. The RBAC plays an …
Top 15 Open Source GitOps Tools
GitOps is a collaborative practice. In addition to the human factor in its adoption, you need to consider a GitOps operator that will help enable the principle in your CI/CD pipelines. By leveraging tools that are customary to a developer’s workflow, GitOps makes infrastructure definition and management inclusive for developers. It allows developers and operations …
DevOps in 2022: These are our predictions
Since its adoption in the software production community, DevOps has helped organizations roll out products faster by ensuring better collaboration among the various teams in the organization. Over the years, we have witnessed new trends adopted by organizations practicing DevOps in their bid to accelerate further the adoption of the concept and speed up the …
The DevOps deployment checklist
Main: DevOps practices are employed in organizations to break down existing silos and create a better environment for collaborations between teams to happen. DevOps isn’t a technology but rather a cultural practice that relies on technology to optimize operations. As opposed to the waterfall or agile method of production with DevOps, engineers can run multiple …
A Beginner’s Guide to OWASP
What is OWASP? Open Web Application Security Project (OWASP) is a nonprofit foundation that is dedicated to improving web applications security. The vibrant OWASP community has projects, forums, and events aimed at increasing the members’ security preparedness. These efforts are further supported by making all the materials free and easily accessible from their website. It …
6 testing types, every developer should understand
If you Google testing types in software engineering, you’ll certainly end with a list of hundreds of tests. We are sure not all of them will be useful for you. There are also some testing types that have two or three names and some others are very similar even if they have different names. So …