Whitepaper

Proteggere gli ambienti cloud dinamici

Sviluppare una lista di controllo personale delle soluzioni in un paradigma in evoluzione Il cloud computing ha trasformato il modo in cui consumiamo e utilizziamo le soluzioni IT. La potenza di elaborazione si sta rapidamente evolvendo verso un modello di utilità, con un’infrastruttura condivisa nella sua essenza. Questa infrastruttura condivisa alla base della rivoluzione del

Proteggere il cloud con Fortinet

5 aree chiave in cui gli architetti devono potenziare gli strumenti di sicurezza nativi per il cloud I team di DevOps aziendali sono in prima linea nel percorso verso il cloud, ma molti trascurano le implicazioni di sicurezza del passaggio. Se si limitano ad accettare le offerte di sicurezza della loro piattaforma cloud, è probabile

TO ENCRYPT, OR NOT TO ENCRYPT: WHAT IS THE REGULATION?

Regulations in many countries require organizations to secure and encrypt any communications with their customers. The downside: those organizations now have to grapple with threats that hide within encrypted traffic. The use of codes and ciphers to protect sensitive information began thousands of years ago—the well-known “Caesar cipher” is named for Julius Caesar, who used

7 STEPS TO SIMPLIFY MIGRATING ARCHITECTURES TO THE CLOUD

The good news is that if you’re like most companies, you’ve done this before. Many times. About every three to five years you overhaul your core architectures. You adjust how you deliver applications. You strive to increase performance, enhance security, and reduce costs. The bad news is that with cloud, things will be even more

2019 PHISHING AND FRAUD REPORT

Welcome to F5 Labs’ third annual report on phishing and fraud. Once again, we’re bringing you data from our partner Webroot as well as the F5 Security Operations Center. Phishing continues to be a major source of profit for cyber-criminals, and a big hassle for cyber-defenders. In the F5 Labs 2019 Application Protection Report, F5

4 Ways to Increase Developer Buy-In of AppSec

Today, most organizations are in a race to deliver new, innovative software before their competitors. In turn, they have gone from bi-annual software releases to daily, hourly, or even by-the-minute releases. To keep up with these rapid deployments, security has had to shift from being a late-stage blocker, to an integrated part of the development

STATE OF SOFTWARE SECURITY Open Source Edition

Application security is one of the great frontiers in information security Apart from the code that is authored by developers, virtually no modern application can avoid including open source libraries that provide functionality that would be extremely tedious to write from scratch. Whether we’re looking at a relatively common library with a rich feature set,