opinionSecurity takes a front seatThreats that have always existed but are now amped up by generative AI are making enterprise leadership take notice and open the purse strings. By Matt AsayAug 19, 20244 minsTechnology IndustryApplication SecurityCloud Security analysis Red-teaming AI with PyRITBy Simon BissonAug 15, 20247 minsMicrosoft AzureGenerative AIApplication Securityanalysis Focusing open source on security, not ideologyBy Matt AsayJul 22, 20244 minsCloud SecurityOpen SourceSecurity Practices featureHow evolving AI regulations impact cybersecurityBy Ram Movva and Aviral Verma Jul 02, 20248 minsGenerative AIData GovernanceApplication Security news7 application security startups at RSAC 2024By Victor Garza May 14, 20246 minsApplication SecurityDevopsSecurity analysisUnderstanding Microsoft’s Trusted Signing serviceBy Simon Bisson May 02, 20248 minsMicrosoft AzureApplication SecurityCloud Computing newsJava services hit hardest by third-party vulnerabilities, report saysBy Paul Krill Apr 18, 20242 minsJavaJavaScriptPython newsRust gets security fix for Windows vulnerabilityBy Paul Krill Apr 12, 20242 minsRustSecuritySoftware Development featureRust memory safety explainedBy Serdar Yegulalp Apr 03, 20247 minsC++RustProgramming Languages ArtikelnewsJava 22 brings security enhancementsJDK 22 adds 10 new root CA certificates, a new asymmetric key interface, and a -XshowSettings option for displaying security settings. By Paul Krill Mar 22, 2024 3 minsJavaProgramming LanguagesSecuritybrandpostThe future of cloud security: Top trends to watch in 2024In 2024, CISOs evaluating their cloud security strategies must prioritize an end-to-end solution capable of delivering proactive protections from code to cloud. Mar 14, 2024 7 minsSicherheitfeatureOpen source is not insecureOpen source doesn’t have a security problem. It has a distribution problem. By Dan Lorenc Mar 14, 2024 10 minsApplication SecurityDevopsOpen SourcenewsJetBrains releases security fixes for TeamCity CI/CD systemTwo critical security vulnerabilities discovered by Rapid7 could allow an attacker to gain administrative control of TeamCity On-Premises servers.By Paul Krill Mar 12, 2024 1 minCI/CDApplication SecurityDevopsnewsBiden executive order protects personal dataOrder authorizes prevention of large-scale data transfers to countries of concern including China, Russia, Iran, and North Korea. By Paul Krill Mar 01, 2024 2 minsTechnology IndustryData GovernanceSecurityfeatureMartin Hellman: We’re playing Russian rouletteCo-inventor of public-key cryptography, winner of the Turing prize, and advocate for world peace, Martin Hellman shares his insights on technology, conflict, and personal development.By Matthew Tyson Feb 07, 2024 10 minsTechnology IndustrySecuritySoftware DevelopmentfeatureProtecting against software supply chain attacksOpen source software is ubiquitous, and supply chain attacks are on the rise. Companies should consider these three strategies to secure their software. By Vishal Ghariwala Jan 30, 2024 6 minsApplication SecurityDevopsOpen SourcefeatureA guide to implementing fine-grained authorizationRelationship-based access control offers a flexible way to add fine-grained authorization to applications and resources. Here’s why, and how. By Rishi Bhargava Jan 23, 2024 7 minsApplication SecuritySecuritySoftware DevelopmentanalysisConfidential computing in Microsoft Azure gets a boostHardware-backed confidential computing in Microsoft Azure now includes protected environments for VMs, containers, and GPUs, without the need to write specialized code. By Simon Bisson Dec 14, 2023 6 minsMicrosoft AzureCloud SecurityCloud ComputingnewsMeta releases open-source tools for AI safetyThe Purple Llama project aims to help developers build generative AI models responsibly.By Sascha Brodsky Dec 08, 2023 2 minsGenerative AIOpen SourceSecurityfeature3 security best practices for all DevSecOps teamsDevSecOps has gained traction in the past decade, but teams still struggle to identify which security practices are most critical to their success. Here are three ways to shift left on security.By Isaac Sacolick Dec 04, 2023 8 minsCloud SecurityDevopsSecurityfeature6 security best practices for cloud-native applicationsBuilding secure, resilient, and scalable cloud-native applications requires a new set of best practices that diverge from traditional application development. Start with these six. By Yossi Pik Nov 14, 2023 10 minsApplication SecurityDevopsSecurity Mehr zeigen Weniger anzeigen View all Upcoming Events19/Sep conference The Official CIO Summit UKSep 19, 20249:00 AM – 17:30 PM GMTCounty Hall, London CIO 19/Sep awards CIO 100 Awards UKSep 19, 2024County Hall, London CIO 01/Oct conference DevOps Summit UKOct 01, 20249:00 AM – 17:30 PM GMTAndaz London Liverpool Street CIO View all events Video on demand videoThe power of Python enumsThe \\\”enum\\\” type in Python lets you create variables constrained to a predefined range of values. Learn how this built-in Python type can be used to express the state of something, whether as a string, an integer, or some other type – and how to ensure the values you create remain consistent both inside and outside your program. Aug 27, 2024 4 minsPython The basics of Pillow, Python’s image manipulation library Aug 16, 2024 6 minsPython How to use the watch command Aug 16, 2024 2 minsOpen Source How to use dbm to stash data quickly in Python Jul 04, 2024 4 minsPython See all videos Explore a topic Analytics Artificial Intelligence Karriere Cloud Computing Data Management Databases Development Tools Devops Emerging Technology Generative AI Java JavaScript Microsoft .NET Open Source View all topics All topics Schließen Sie Analytics Artificial Intelligence Karriere Cloud Computing Data Management Databases Development Tools Devops Emerging Technology Generative AI Java JavaScript Microsoft .NET Open Source Programming Languages Python Software-Entwicklung Technology Industry Show me moreLatestArtikelVideos news Salesforce previews new XGen-Sales model, releases xLAM family of LLMs By Anirban Ghoshal Sep 06, 202410 mins Development ToolsOpen SourceArtificial Intelligence analysis Are you ready for data hyperaggregation? By David Linthicum Sep 06, 20244 mins Data IntegrationCloud ComputingData Management analysis What is GitHub? More than Git version control in the cloud By Martin Heller Sep 06, 202419 mins GitHubDevelopment ToolsOpen Source video How to auto-generate Python type hints with Monkeytype Jun 11, 20245 mins Python video How to make HTML GUIs in Python with NiceGUI Jun 04, 20245 mins Python video Python 3.13's new JIT and no-GIL modes May 23, 20247 mins Python