Remove application-security as-devops-accelerates-security-s-role-changes
article thumbnail

GUEST ESSAY: An assessment of how ‘Gen-AI’ has begun to transform DevSecOps

The Last Watchdog

Related: The primacy of DevSecOps Through harnessing the power of Generative AI, enterprises can usher in a new era of DevSecOps, elevating development velocity, security, and robustness to unprecedented levels. AI can play a pivotal role in automating these processes. The AI model can then review new code changes automatically.

article thumbnail

Securing AWS EKS Environments

Cisco Security

So, your organization’s simplifying Kubernetes management with AWS’s Elastic Kubernetes Service (EKS). Now, how are you going to secure that cluster? Whether your role is on the application team, or in DevOps or SecOps, you might be thinking: We chose EKS because agility is important to us.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk

The Security Ledger

Take climate change: scientists recognized the growing threat of a warming climate due to human activity more than 40 years ago. Rohit Ghai is the President of RSA Security says mega trends like “digital transformation” threaten to accelerate risk in organizations. We live in a time where trust is tenuous.

article thumbnail

Too Many Security Testing Tools? Here Are 5 Things Your Devsecops Tools Should Do

ForAllSecure

DevSecOps is more than just a buzzword—it's a game-changing approach for modern software development teams. Gone are the days of slapping security on as an afterthought. The only way to ensure software is safe is to integrate security testing into your DevOps process. The problem?

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

She’s an amazing person who has done an amazing number of things in a short amount of time -- CMU professor, Forrester analyst, CSO at a successful startup -- and she’s not done changing the industry. And I was really fortunate to land the security beat right away. That is, until Chenxi Wang spoke up.

InfoSec 40
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

Hackers now leverage GenAI to launch targeted attacks that bypass traditional security systems. This means security vendors should create multi-tenant solutions that integrate easily with other security vendors’ products and cover both cloud and on-premise environments with flexible licensing and billing models and dedicated programs.

article thumbnail

GUEST ESSAY: Embracing ‘Zero Trust’ can help cloud-native organizations operate securely

The Last Watchdog

Related: The targeting of supply-chain security holes. By using flexible, modular container technologies such as Kubernetes and microservices, development teams are better equipped to streamline and accelerate the application lifecycle, which in turn enables the business to deliver on their ambitious digital transformation initiatives.