Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

The Top 10 Questions about the GPL License - Answered!

The GNU General Public License (GPL) is one of the most widely used open source software licenses. It was created by the Free Software Foundation (FSF) to protect the GNU’s software from being made proprietary. The GPL emphasizes the principles of software freedom and promotes the sharing of knowledge and collaboration. It is a copyleft license that requires any modified versions or derivative works to be licensed under the GPL.

Which Critical Vulnerabilities Discovered in 2023 Can Do Serious Damage? Read Our Report

Software vulnerabilities are among the biggest security risks organizations face today, and several critical vulnerabilities have already been revealed in 2023. Software bugs plague enterprises and small organizations alike and wreak havoc on entire supply chains. What’s worse, new bugs emerge on a regular basis, forcing security leaders and teams to scramble for solutions to avoid data breaches and other incidents.

Reasons to Stick with Open Source Velero for your Kubernetes Backup and Recovery

I recently had a chance to speak with Chris Mellor at Block and Files about the emergence of Velero as the standard for Kubernetes data protection. I shared some ballpark estimates of market share across open source and commercial vendors to make my case. These numbers were obtained through diligent market research. They are estimates, but they are not imaginary.

Resource Catalog

Resource Catalog provides visibility and security context directly to DevOps in the same platform they are already using every day to monitor their infrastructure. As a result, DevOps teams no longer have to react to a laundry list of security threats. Instead, they are armed with the insight to vigilantly detect security misconfigurations and reduce the mean time to remediation so that their security posture is strengthened.

NIST Security Control Baselines and SP 800-53B Compliance Guide

The National Institute of Standards and Technology (NIST) is on a mission to maintain measurement standards, technology advancements, and industrial competitiveness in the United States. This article provides guidance and a set of working assumptions that help guide and inform the control selection process. It also provides guidance on the development of overlays to facilitate control baseline customization for specific communities of interest, technologies, and environments of operations.

Server Hardening The Complete Guide

Server hardening is basic requirement for achieving security and compliance. Server hardening helps prevent unauthorized access, unauthorized use, and disruptions in service. It is an essential part of the installation and maintenance of servers that ensure data integrity, confidentiality, and is part of most compliance frameworks and industry standards.