by Azalio tdshpsk | Apr 8, 2022 | Security
GitHub has updated its Advanced Security service with a “push protection” capability. The new feature scans code for secrets such as access tokens, API keys, and other credentials as developers push the code to a repository, and blocks the push if a secret is...
by Azalio tdshpsk | Mar 29, 2022 | Security
Preaching the mantra that “the web is for everyone,” Mozilla has published a vision for the evolution of the web that stresses openness and safety, with the company aiming to address shortfalls in areas including privacy and complexity.The vision document covers what...
by Azalio tdshpsk | Mar 14, 2022 | Security
I was intrigued by an article I read the other day in CSO Online titled “4 security concerns for low-code and no-code development”. The premise of the article was, essentially, that enterprises must beware of low-code solutions, because they can cause security...
by Azalio tdshpsk | Mar 2, 2022 | Security
Researchers at the Laboratory for Innovation Science at Harvard University (LISH) have published the most comprehensive census of free and open source (FOSS) software packages to date, with the aim of helping the industry better protect against high-profile...
by Azalio tdshpsk | Feb 24, 2022 | Security
Hot on the heels of Diffie-Hellman upending the cryptography applecart in 1976 came three more crypto newcomers that further revolutionized the field: Ron Rivest, Adi Shamir, and Leonard Adleman. The trio devised a way to negotiate secure communication between unknown...
by Azalio tdshpsk | Feb 23, 2022 | Security
Argo CD is a popular open source, continuous delivery (CD) platform for Kubernetes that is used by hundreds of organizations globally. Recently, a serious vulnerability in Argo CD was uncovered by Apiiro, which enables attackers to access sensitive information such as...