Tag: Principles
-
Navigating the API Security Landscape: A CEO’s Perspective on Embedding Zero Trust Principles
By Jyoti Bansal, CEO and Co-Founder, Traceable AI In the dynamic world of digital transformation, I’ve observed a paradigm shift that is …
-
OpenSSF and CISA partner on Principles for Package Repository Security
According to the OpenSSF, package repositories are a critical point in the open source ecosystem for either allowing or preventing attacks. …
-
An Introduction to Cyber Threat Intelligence: Key Concepts and Principles
Cyber Threat Intelligence (CTI), or threat intelligence, is evidence-based knowledge established from current cyber threats, gathered from …
-
Introducing the book: Cybersecurity First Principles
In this Help Net Security video interview, Rick Howard, CSO of N2K, Chief Analyst, and Senior Fellow at the Cyberwire, discusses his book …
-
4 Principles for Creating a New Blueprint for Secure Software Development
Improving the security of the software development process is a key part of thwarting and mitigating these attackers. We encourage the …
-
Shifting the Balance of Cybersecurity Risk: Security-by-Design and Default Principles
Shifting the Balance of Cybersecurity Risk: Security-by-Design and Default Principles serves as a cybersecurity roadmap for manufacturers …
-
UK Discloses Offensive Cyber Capabilities Principles
The UK government continues to adjust its cyber response to the growing threat posed by nation-state adversaries, in line with its latest …
-
How to Apply NIST Principles to SaaS in 2023
The National Institute of Standards and Technology (NIST) is one of the standard-bearers in global cybersecurity. The U.S.-based …
-
3 Principles for Building Secure Serverless Functions
Serverless functions, which account for around half of the workloads today at cloud-first companies, have become a popular means of …
-
Key Basic Principles to Secure Kubernetes’ Future
Once these capabilities have been established, Ops teams can begin to look further afield and explore leveraging the value of their data …
-
Principles for Kubernetes security and good hygiene
Traditional methods of software security are not a good fit for Kubernetes: a renewed set of security implementations are required to make …
●●●