Developing a Platform Mindset for APIs
1 day, 5 hours ago |
thenewstack.io
Is Community-Backed Open Source Software Worth the Risk?
2 days, 5 hours ago |
thenewstack.io
Why Developers Will Take Charge of Security, Tests in Prod
4 days, 3 hours ago |
thenewstack.io
Taking a ‘Machine-First’ Approach to Identity Management
5 days, 2 hours ago |
thenewstack.io
Serverless WebAssembly: Security, Speed … and Startup Times
1 week, 3 days ago |
thenewstack.io
Tips for Controlling the Costs of Security Tools
1 week, 3 days ago |
thenewstack.io
A Guide to Open Source Software Security
1 week, 3 days ago |
thenewstack.io
Rethinking Identity and Access for Cloud Native
2 weeks, 2 days ago |
thenewstack.io
Flaw in R Creates Supply Chain Security Risks
2 weeks, 2 days ago |
thenewstack.io
eBPF: Reliable Policy Setting and Enforcement
3 weeks, 3 days ago |
thenewstack.io
Linus Torvalds on Security, AI, Open Source and Trust
4 weeks, 1 day ago |
thenewstack.io
Rust Gets Security, WASI 0.2 Support, Productivity Boost
1 month, 1 week ago |
thenewstack.io
AI, LLMs and Security: How to Deal with the New Threats
1 month, 1 week ago |
thenewstack.io
Down with Detection Obsession: Proactive Security in 2024
1 month, 1 week ago |
thenewstack.io
Zero Trust for Legacy Apps: Load Balancer Layer Can Be a Solution
1 month, 1 week ago |
thenewstack.io
Shifting Left Is Now Mainstream for Developers, or Is It?
1 month, 1 week ago |
thenewstack.io
The Linux xz Backdoor Episode: An Open Source Mystery
1 month, 2 weeks ago |
thenewstack.io
The Security Risks of Generative AI Package Hallucinations
1 month, 2 weeks ago |
thenewstack.io
Chainguard: Outdated Containers Accumulate Vulnerabilities
1 month, 2 weeks ago |
thenewstack.io
Product Security Plans: What They Are and Why They Matter
1 month, 3 weeks ago |
thenewstack.io
How to Prevent Secrets from Creeping into Code
1 month, 3 weeks ago |
thenewstack.io
Decoding DevSecOps: Striking the Right Balance
1 month, 4 weeks ago |
thenewstack.io
Dev News: NFT of GitHub Exploit, Netlify’s AI Deploy, and More
2 months, 1 week ago |
thenewstack.io
Vendoring: Why You Still Have Overlooked Security Holes
2 months, 1 week ago |
thenewstack.io
KubeCon 24: GUAC Reveals Where the Vulnerabilities Hide
2 months, 1 week ago |
thenewstack.io
Is Open Source under Threat or Primed to Go to the Next Level?
2 months, 1 week ago |
thenewstack.io
Falco Plugin for Okta Adds Context to Quickly Thwart Threats
2 months, 2 weeks ago |
thenewstack.io
White House Warns Against Using Memory-Unsafe Languages
2 months, 2 weeks ago |
thenewstack.io
Linux Pass: A Text-Based Password Manager
2 months, 2 weeks ago |
thenewstack.io
Akeyless Wants You to Throw Away the Encryption Key
2 months, 3 weeks ago |
thenewstack.io
How to Address Kubernetes Risks and Vulnerabilities Head-on
2 months, 3 weeks ago |
thenewstack.io
5 Tips for Developer-Friendly DevSecOps
2 months, 3 weeks ago |
thenewstack.io
The Top 5 Kubernetes Security Mistakes You’re Probably Making
2 months, 4 weeks ago |
thenewstack.io
Secure Your Future in 2024: Grab a Piece of the K8s Security Pie
3 months, 1 week ago |
thenewstack.io
WebAssembly’s Isolation in Today’s and Tomorrow’s Security
3 months, 1 week ago |
thenewstack.io
Linux: Hide Your Shell Passwords with sshpass
3 months, 2 weeks ago |
thenewstack.io
Using MQL to Stop Novel Email Phishing Attacks
3 months, 2 weeks ago |
thenewstack.io
Level up: Gamify Your Software Security
3 months, 2 weeks ago |
thenewstack.io
Leaky Vessels Vulnerability Sinks Container Security
3 months, 2 weeks ago |
thenewstack.io
We Need to Rethink Risk in Vulnerability Management
3 months, 2 weeks ago |
thenewstack.io
Taking a ‘Machine-First’ Approach to Identity Management
5 days, 2 hours ago |
thenewstack.io
Developing a Platform Mindset for APIs
1 day, 5 hours ago |
thenewstack.io
Why Developers Will Take Charge of Security, Tests in Prod
4 days, 3 hours ago |
thenewstack.io
Is Community-Backed Open Source Software Worth the Risk?
2 days, 5 hours ago |
thenewstack.io
Items published with this topic over the last 90 days.
Latest
Developing a Platform Mindset for APIs
1 day, 5 hours ago |
thenewstack.io
Is Community-Backed Open Source Software Worth the Risk?
2 days, 5 hours ago |
thenewstack.io
Why Developers Will Take Charge of Security, Tests in Prod
4 days, 3 hours ago |
thenewstack.io
Taking a ‘Machine-First’ Approach to Identity Management
5 days, 2 hours ago |
thenewstack.io
Serverless WebAssembly: Security, Speed … and Startup Times
1 week, 3 days ago |
thenewstack.io
Tips for Controlling the Costs of Security Tools
1 week, 3 days ago |
thenewstack.io
A Guide to Open Source Software Security
1 week, 3 days ago |
thenewstack.io
Rethinking Identity and Access for Cloud Native
2 weeks, 2 days ago |
thenewstack.io
Flaw in R Creates Supply Chain Security Risks
2 weeks, 2 days ago |
thenewstack.io
eBPF: Reliable Policy Setting and Enforcement
3 weeks, 3 days ago |
thenewstack.io
Linus Torvalds on Security, AI, Open Source and Trust
4 weeks, 1 day ago |
thenewstack.io
Rust Gets Security, WASI 0.2 Support, Productivity Boost
1 month, 1 week ago |
thenewstack.io
AI, LLMs and Security: How to Deal with the New Threats
1 month, 1 week ago |
thenewstack.io
Down with Detection Obsession: Proactive Security in 2024
1 month, 1 week ago |
thenewstack.io
Zero Trust for Legacy Apps: Load Balancer Layer Can Be a Solution
1 month, 1 week ago |
thenewstack.io
Shifting Left Is Now Mainstream for Developers, or Is It?
1 month, 1 week ago |
thenewstack.io
The Linux xz Backdoor Episode: An Open Source Mystery
1 month, 2 weeks ago |
thenewstack.io
The Security Risks of Generative AI Package Hallucinations
1 month, 2 weeks ago |
thenewstack.io
Chainguard: Outdated Containers Accumulate Vulnerabilities
1 month, 2 weeks ago |
thenewstack.io
Product Security Plans: What They Are and Why They Matter
1 month, 3 weeks ago |
thenewstack.io
How to Prevent Secrets from Creeping into Code
1 month, 3 weeks ago |
thenewstack.io
Decoding DevSecOps: Striking the Right Balance
1 month, 4 weeks ago |
thenewstack.io
Dev News: NFT of GitHub Exploit, Netlify’s AI Deploy, and More
2 months, 1 week ago |
thenewstack.io
Vendoring: Why You Still Have Overlooked Security Holes
2 months, 1 week ago |
thenewstack.io
KubeCon 24: GUAC Reveals Where the Vulnerabilities Hide
2 months, 1 week ago |
thenewstack.io
Is Open Source under Threat or Primed to Go to the Next Level?
2 months, 1 week ago |
thenewstack.io
Falco Plugin for Okta Adds Context to Quickly Thwart Threats
2 months, 2 weeks ago |
thenewstack.io
White House Warns Against Using Memory-Unsafe Languages
2 months, 2 weeks ago |
thenewstack.io
Linux Pass: A Text-Based Password Manager
2 months, 2 weeks ago |
thenewstack.io
Akeyless Wants You to Throw Away the Encryption Key
2 months, 3 weeks ago |
thenewstack.io
How to Address Kubernetes Risks and Vulnerabilities Head-on
2 months, 3 weeks ago |
thenewstack.io
5 Tips for Developer-Friendly DevSecOps
2 months, 3 weeks ago |
thenewstack.io
The Top 5 Kubernetes Security Mistakes You’re Probably Making
2 months, 4 weeks ago |
thenewstack.io
Secure Your Future in 2024: Grab a Piece of the K8s Security Pie
3 months, 1 week ago |
thenewstack.io
WebAssembly’s Isolation in Today’s and Tomorrow’s Security
3 months, 1 week ago |
thenewstack.io
Linux: Hide Your Shell Passwords with sshpass
3 months, 2 weeks ago |
thenewstack.io
Using MQL to Stop Novel Email Phishing Attacks
3 months, 2 weeks ago |
thenewstack.io
Level up: Gamify Your Software Security
3 months, 2 weeks ago |
thenewstack.io
Leaky Vessels Vulnerability Sinks Container Security
3 months, 2 weeks ago |
thenewstack.io
We Need to Rethink Risk in Vulnerability Management
3 months, 2 weeks ago |
thenewstack.io
Top (last 7 days)
Taking a ‘Machine-First’ Approach to Identity Management
5 days, 2 hours ago |
thenewstack.io
Developing a Platform Mindset for APIs
1 day, 5 hours ago |
thenewstack.io
Why Developers Will Take Charge of Security, Tests in Prod
4 days, 3 hours ago |
thenewstack.io
Is Community-Backed Open Source Software Worth the Risk?
2 days, 5 hours ago |
thenewstack.io
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark