analysisWhy are we still confused about cloud security?We’re building too much complexity and are ill-trained to secure it. The result will be breach after breach, while enterprises wonder what happened. Get a clue now.By David LinthicumOct 15, 20245 minsCloud SecurityIdentity and Access ManagementSecurity Infrastructure news Open source package entry points could be used for command jackingBy Howard SolomonOct 14, 20241 minVulnerabilitiesOpen SourceSecurityanalysis Why cloud security outranks cost and scalabilityBy David LinthicumOct 04, 20245 minsMicroservicesCloud SecurityAPIs analysisUnderstanding VBS Enclaves, Windows’ new security technologyBy Simon Bisson Oct 03, 20248 minsContainersWindows SecurityData and Information Security newsJava 23 highlights crypto performance and securityBy Paul Krill Sep 24, 20243 minsJavaProgramming LanguagesSecurity opinionSecurity takes a front seatBy Matt Asay Aug 19, 20244 minsTechnology IndustryApplication SecurityCloud Security analysisRed-teaming AI with PyRITBy Simon Bisson Aug 15, 20247 minsMicrosoft AzureGenerative AIApplication Security analysisFocusing open source on security, not ideologyBy Matt Asay Jul 22, 20244 minsCloud SecurityOpen SourceSecurity Practices featureHow evolving AI regulations impact cybersecurityBy Ram Movva and Aviral Verma Jul 02, 20248 minsGenerative AIData GovernanceApplication Security Articlesnews7 application security startups at RSAC 2024VC-backed up-and-comers zero in on devsecops, the software supply chain, and securing the software development life cycle. By Victor Garza May 14, 2024 6 minsApplication SecurityDevopsSecurityanalysisUnderstanding Microsoft’s Trusted Signing serviceA new managed signing service on Azure offers low-cost, low-touch code signing with integration into GitHub Actions.By Simon Bisson May 02, 2024 8 minsMicrosoft AzureApplication SecurityCloud ComputingnewsJava services hit hardest by third-party vulnerabilities, report saysState of DevSecOps report finds 90% of Java services susceptible to vulnerabilities in third-party libraries.By Paul Krill Apr 18, 2024 2 minsJavaJavaScriptPythonnewsRust gets security fix for Windows vulnerabilityRust 1.77.2 point release addresses a critical vulnerability affecting Windows deployments. By Paul Krill Apr 12, 2024 2 minsRustSecuritySoftware DevelopmentfeatureRust memory safety explainedWhat makes the Rust language one of the best for writing fast, memory-safe applications? Rust's memory-safety features are baked into the language itself.By Serdar Yegulalp Apr 03, 2024 7 minsC++RustProgramming LanguagesnewsJava 22 brings security enhancementsJDK 22 adds 10 new root CA certificates, a new asymmetric key interface, and a -XshowSettings option for displaying security settings. By Paul Krill Mar 22, 2024 3 minsJavaProgramming LanguagesSecuritybrandpostThe future of cloud security: Top trends to watch in 2024In 2024, CISOs evaluating their cloud security strategies must prioritize an end-to-end solution capable of delivering proactive protections from code to cloud. Mar 14, 2024 7 minsSecurityfeatureOpen source is not insecureOpen source doesn’t have a security problem. It has a distribution problem. By Dan Lorenc Mar 14, 2024 10 minsApplication SecurityDevopsOpen SourcenewsJetBrains releases security fixes for TeamCity CI/CD systemTwo critical security vulnerabilities discovered by Rapid7 could allow an attacker to gain administrative control of TeamCity On-Premises servers.By Paul Krill Mar 12, 2024 1 minCI/CDApplication SecurityDevopsnewsBiden executive order protects personal dataOrder authorizes prevention of large-scale data transfers to countries of concern including China, Russia, Iran, and North Korea. By Paul Krill Mar 01, 2024 2 minsTechnology IndustryData GovernanceSecurityfeatureMartin Hellman: We’re playing Russian rouletteCo-inventor of public-key cryptography, winner of the Turing prize, and advocate for world peace, Martin Hellman shares his insights on technology, conflict, and personal development.By Matthew Tyson Feb 07, 2024 10 minsTechnology IndustrySecuritySoftware DevelopmentfeatureProtecting against software supply chain attacksOpen source software is ubiquitous, and supply chain attacks are on the rise. Companies should consider these three strategies to secure their software. By Vishal Ghariwala Jan 30, 2024 6 minsApplication SecurityDevopsOpen Source Show more Show less View all Upcoming Events28/Nov conference The Official CSO Security Summit UKNov 28, 20249:30 am – 17:30 GMTAndaz London Liverpool Street CSO and CISO 28/Nov awards CSO 30 Awards UKNov 28, 202418:30-21:30 GMTAndaz London Liverpool Street CSO and CISO 28/Nov awards Next CSO Awards UKNov 28, 202418:30-21:30 GMTAndaz London Liverpool Street CSO and CISO View all events Video on demand videoHow to get better web requests in Python with httpxIf you use Python for accessing API endpoints or web scraping, odds are you’re using either Python’s native http libraries or a third-party module like requests. In this video, we take a look at the httpx library — an easy, powerful, and future-proof way to make HTTP requests. It provides tools for everything from sending form data to handling multipart file uploads, and works with both synchronous and async code. Oct 07, 2024 4 minsPython How to better integrate Python/C with CFFI Oct 03, 2024 5 minsPython How to create and work with zip archives using Python Oct 01, 2024 5 minsPython How to implement “modes” in software, with a game as an example Sep 12, 2024 4 minsPython See all videos Explore a topic Analytics Artificial Intelligence Careers Cloud Computing Data Management Databases Development Tools Devops Emerging Technology Generative AI Java JavaScript Microsoft .NET Open Source View all topics All topics Close Analytics Artificial Intelligence Careers Cloud Computing Data Management Databases Development Tools Devops Emerging Technology Generative AI Java JavaScript Microsoft .NET Open Source Programming Languages Python Software Development Technology Industry Show me moreLatestArticlesVideos analysis AI stagnation: The gap between AI investment and AI adoption By David Linthicum Oct 18, 20245 mins Software DeploymentArtificial IntelligenceCareers analysis True multithreading in Python at last! By Serdar Yegulalp Oct 18, 20242 mins PythonProgramming LanguagesSoftware Development how-to How to use Task.WhenEach in .NET 9 By Joydip Kanjilal Oct 17, 20246 mins Microsoft .NETC#Development Libraries and Frameworks video Powerful Python source code processing with "ast" Sep 10, 20249 mins Python video The power of Python enums Aug 27, 20244 mins Python video The basics of Pillow, Python's image manipulation library Aug 16, 20246 mins Python