Guest Expert, Author at Security Boulevard https://securityboulevard.com/author/guest-expert/ The Home of the Security Bloggers Network Wed, 27 Mar 2024 18:55:39 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Guest Expert, Author at Security Boulevard https://securityboulevard.com/author/guest-expert/ 32 32 133346385 Vulnerability Management Lifecycle in DevSecOps https://securityboulevard.com/2024/03/vulnerability-management-lifecycle-in-devsecops/ https://securityboulevard.com/2024/03/vulnerability-management-lifecycle-in-devsecops/#respond Wed, 27 Mar 2024 18:55:39 +0000 http://securityboulevard.com/?guid=5e2461584f1021d7ef8604fbf346e44e In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams.
The first stage of his DevSecOps program: vulnerability management.

The post Vulnerability Management Lifecycle in DevSecOps appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/vulnerability-management-lifecycle-in-devsecops/feed/ 0 2013207
How To Respond To An AWS Key Honeytoken Trigger: A Detailed Guide https://securityboulevard.com/2024/03/how-to-respond-to-an-aws-key-honeytoken-trigger-a-detailed-guide/ https://securityboulevard.com/2024/03/how-to-respond-to-an-aws-key-honeytoken-trigger-a-detailed-guide/#respond Thu, 21 Mar 2024 16:57:00 +0000 http://securityboulevard.com/?guid=47c8a3cacb47bc938d12f852f3096c00 Learn how to effectively respond to an AWS key honeytoken trigger with this step-by-step guide. Investigate the incident, identify the leak source, secure your environment, and leverage OSINT techniques to protect your AWS infrastructure.

The post How To Respond To An AWS Key Honeytoken Trigger: A Detailed Guide appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/how-to-respond-to-an-aws-key-honeytoken-trigger-a-detailed-guide/feed/ 0 2012636
A Guide to Cloud Security Posture Management (CSPM) https://securityboulevard.com/2024/02/a-guide-to-cloud-security-posture-management-cspm/ Wed, 28 Feb 2024 18:54:06 +0000 http://securityboulevard.com/?guid=a7d762dad3825cb215a15c1ce776da27 What is CSPM? Cloud Security Posture Management is about identifying and remediating security misconfigurations and risks to (IaaS) Infrastructure as a Service or (PaaS) Platform as a service environments.

The post A Guide to Cloud Security Posture Management (CSPM) appeared first on Security Boulevard.

]]>
2010612
How to Handle Mobile App Secrets https://securityboulevard.com/2024/02/how-to-handle-mobile-app-secrets/ Fri, 23 Feb 2024 16:00:10 +0000 http://securityboulevard.com/?guid=76a603ea902ebb4ee3b8dd9e50e5e572 Learn why storing secrets in mobile apps is a major security risk, how to manage user and developer secrets properly, and why client-side secrecy is impossible. Find out the best practices for securing mobile app secrets and protecting your data.

The post How to Handle Mobile App Secrets appeared first on Security Boulevard.

]]>
2010057
How SAST Tools Secure AI-generated Code https://securityboulevard.com/2024/02/how-sast-tools-secure-ai-generated-code/ Mon, 19 Feb 2024 10:22:38 +0000 http://securityboulevard.com/?guid=4d24649c5a16f65de3ea0e481cf4d61b As AI continues to reshape how code is written and managed, the emphasis on vigilant, security-conscious development practices becomes increasingly crucial. SAST stands as a critical tool in ensuring that the efficiencies gained through AI do not come at the cost of security and reliability.

The post How SAST Tools Secure AI-generated Code appeared first on Security Boulevard.

]]>
2009283
Securing The Software Delivery Pipeline With Honeytokens https://securityboulevard.com/2024/02/securing-the-software-delivery-pipeline-with-honeytokens/ Wed, 14 Feb 2024 17:06:13 +0000 http://securityboulevard.com/?guid=1fc02efffd79234093fa85ce81e0a7b2 Discover how honeytokens enhance security by detecting breaches in real-time across the software development lifecycle. Learn how to deploy these decoy credentials and traps effectively, bolstering defenses against cyber threats.

The post Securing The Software Delivery Pipeline With Honeytokens appeared first on Security Boulevard.

]]>
2009142
Understanding Broken Object Level Authorization (BOLA) Vulnerability in API Security https://securityboulevard.com/2024/02/understanding-broken-object-level-authorization-bola-vulnerability-in-api-security/ Wed, 14 Feb 2024 16:49:59 +0000 http://securityboulevard.com/?guid=e3156f9d40067801ed581e60792e416d Explore Broken Object Level Authorization (BOLA), its implications, how it can be exploited, and how to secure your applications against it.

The post Understanding Broken Object Level Authorization (BOLA) Vulnerability in API Security appeared first on Security Boulevard.

]]>
2008831
Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool https://securityboulevard.com/2024/02/pulumi-vs-terraform-the-definitive-guide-to-choosing-your-iac-tool/ Mon, 05 Feb 2024 13:18:00 +0000 http://securityboulevard.com/?guid=95384e06588c48a57f18d12c643aae3a In this blog, we do a deep dive into Pulumi V.S. Terraform (and slightly touch the mechanism of AWS CDK/CDK for Terraform, for that matter).

The post Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool appeared first on Security Boulevard.

]]>
2007796
Terraform Project for Managing Vault Secrets in a Kubernetes Cluster https://securityboulevard.com/2024/01/terraform-project-for-managing-vault-secrets-in-a-kubernetes-cluster/ Mon, 29 Jan 2024 11:17:42 +0000 http://securityboulevard.com/?guid=d2f3b559a1b7c7caeebae4c0db8fcbaf This article uses Kubernetes Secrets as a native Kubernetes component for handling sensitive data at container runtime and Vault as a trusted storage and maintenance solution for sensitive data.

The post Terraform Project for Managing Vault Secrets in a Kubernetes Cluster appeared first on Security Boulevard.

]]>
2007146
Application Security Posture Management with GitGuardian and ArmorCode https://securityboulevard.com/2024/01/application-security-posture-management-with-gitguardian-and-armorcode/ Tue, 02 Jan 2024 12:58:30 +0000 http://securityboulevard.com/?guid=eba9c318cf02df08276aeef0cde81bbd Managing GitGuardian Findings as Part of a Complete Risk-Based Software Security Program with ArmorCode ASPM.

The post Application Security Posture Management with GitGuardian and ArmorCode appeared first on Security Boulevard.

]]>
2003451