Content added to Folio

DevOps Resource Center

Technical how-tos and best practices to help you integrate security into your DevOps pipeline

Add Filters
Filter by:
Common Cloud Configuration Errors & Fixes
Compliance

Common Cloud Configuration Errors & Fixes

Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

February 21, 2023
Cloud Native

Top 5 Infrastructure as Code Security Challenges

Learn how to counteract the top five challenges of infrastructure as code (IaC) and discover how these obstacles pose a threat to security and gain valuable insight in how to mitigate these risks.

Best Practices Apr 20, 2023

Save to Folio

Best Practices Apr 20, 2023

Save to Folio

Workload Security

Security Benefits of Cloud Automation

Learn more about how cloud automation can simplify security controls, policies, and scans.

Best Practices Apr 18, 2023

Save to Folio

Best Practices Apr 18, 2023

Save to Folio

Conformity

CIEM vs CWPP vs CSPM Use Cases

Discover the differences between CIEM, CWPP, and CSPM and how to use them individually or in conjunction.

Expert Perspective Apr 13, 2023

Save to Folio

Expert Perspective Apr 13, 2023

Save to Folio

Cloud Native

Why Chaos Engineering is a Good Stress Test Strategy

Learn about chaos engineering, a method of resilience testing that intentionally introduces “chaos” into a system to discover vulnerabilities and weaknesses that can be exploited by attackers.

Expert Perspective Apr 06, 2023

Save to Folio

Expert Perspective Apr 06, 2023

Save to Folio

Cloud Native

Improve Post-Quantum Cryptography Security with CSPM

Gain valuable insight into the emerging world of post-quantum computing and how a security posture management (CSPM) can bolster your post quantum cryptography defenses.

Expert Perspective Apr 04, 2023

Save to Folio

Expert Perspective Apr 04, 2023

Save to Folio

Workload Security

Secure Cloud Migration 101

Cloud migration is a journey, not a destination. Learn the basics of security for making the (gradual) switch, so you can get the most out of what the cloud has to offer.

Best Practices Mar 28, 2023

Save to Folio

Best Practices Mar 28, 2023

Save to Folio

Cloud Native

Best Practices for Secure Remote Development

Discover the best practices for cybersecurity that developers can implement when working remotely. These will secure your system against security breaches and threats like malware, phishing, data theft, ransomware, and spyware.

Best Practices Mar 28, 2023

Save to Folio

Best Practices Mar 28, 2023

Save to Folio

4 Tips for Better AWS Cloud Workload Security

Discover the challenges of AWS cloud workload security and the various technologies that can alleviate them.

Best Practices Mar 23, 2023

Save to Folio

Best Practices Mar 23, 2023

Save to Folio

Cloud Native

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

How To Mar 21, 2023

Save to Folio

How To Mar 21, 2023

Save to Folio

Compliance

Policy as Code vs Compliance as Code

Learn how policy as code and compliance as code differ and how they can help prevent policy and compliance issues. Investigate the critical area of compliance where automation is playing an increasingly important role in IT management.

Expert Perspective Mar 16, 2023

Save to Folio

Expert Perspective Mar 16, 2023

Save to Folio