There are many ways to do DevSecOps, and each organization — each security team, even — uses a different approach. Questions such as how many environments you have and the frequency of deployment of those environments are important in understanding how to integrate a security scanner into your DevSecOps machinery. The ultimate goal is speed […]
It’s Cybersecurity Awareness Month, but security awareness is about much more than just dedicating a month to a few activities. Security awareness is a journey, requiring motivation along the way. And culture. Especially culture.That’s the point Proofpoint Cybersecurity Evangelist Brian Reed drove home in a recent appearance on Business Security Weekly.“If your security awareness program […]
The Amazon employee used knowledge she gained working at the company, along with scripts, to scan Amazon Web Service servers for misconfigured web application firewalls.
National cyber director nominee, Chris Inglis, pointed to three ways that more widespread adoption of cyber best practices could take hold: "One is enlightened self interest; that's apparently not working. The second is market forces; that's apparently not working. And the third is some imposition of standards or regulation on top of that."
Today's columnist, Teresa Shea of Raytheon Intelligence & Space, says groups such as Girls Who Code play a major role in attracting more diversity to the cyber workforce.
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.