Tag: DZone Security Zone

Docker Hardened Images for Container Security

In 2024, a staggering 87% of container images were found to have at least one vulnerability, and a measurable fraction of them have been targeted to compromise the production infrastructure. With cloud and container orchestration adoption not slowing down, the…

Passwordless Authentication: Hype vs. Reality

We are living in an era in which data breaches and cyberattacks are growing exponentially and frequently dominate news headlines. The simple and humble password — since its inception — has repeatedly proven to be difficult to secure against modern,…

IT Asset, Vulnerability, and Patch Management Best Practices

The vulnerability management lifecycle is a continuous process for discovering, addressing, and prioritizing vulnerabilities in an organization’s IT assets A normal round of the lifecycle has five phases: This article has been indexed from DZone Security Zone Read the original…

Why Encryption Alone Is Not Enough in Cloud Security

It is often assumed that encryption is the gold standard method for securing assets in the cloud. Cloud providers give assurances that all their services are “encrypted by default.” Several regulatory and cloud compliance policies mandate that organizations encrypt data…