New & Notable
Securing services News
July 31, 2018
A recently discovered security vulnerability in Apache OpenWhisk zeroes in on IBM Cloud Functions and other commercial products based on the open source serverless platform.
April 27, 2018
Tufin's policy-based security automation tool fortifies DevOps environments, as it integrates with CI/CD tools, scans for threats, and secures containers and microservices.
May 19, 2016
REST appears to be sure-handedly winning the API war with SOAP, so it's time to start learning about REST security. We explore this protocol's latest security developments.
December 26, 2013
As more people gravitate toward mobile devices to access personal data, security needs have risen to be among the major mobile app trends.
Securing services Get Started
Bring yourself up to speed with our introductory content
Whether you're new to distributed architecture or well underway with deployment, this guide on microservices security covers the basics through advanced tooling and strategies. Continue Reading
Make your microservices-based app as secure as possible by adopting an in-depth, layered security strategy because no single traditional approach can reliably do the job. Continue Reading
No one-size-fits-all method exists to defend microservices apps, but you can be confident in your security by adopting specific strategies that thrive in a microservices setting. Continue Reading
Evaluate Securing services Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert George Lawton discusses the best ways to plan out a mobile test strategy that works for your business goals. Continue Reading
The container technologies ecosystem will see better security solutions, more competition between vendors and increased adoption of CaaS in 2017. Continue Reading
Find out why and how enterprises should include security architects into the DevOps process to help avoid software vulnerabilities. Continue Reading
Manage Securing services
Learn to apply best practices and optimize your operations.
Are you ready for serverless security? Learn about four critical planning considerations software teams need to focus on if they plan to adopt serverless. Continue Reading
Containers are complex, and it takes some work to keep your container components and images safe from attack. Here are three critical container development security practices. Continue Reading
Think you know what complicates microservices security and what precautions to take to maximize protection? Challenge yourself, and take this quiz to find out. Continue Reading
Problem Solve Securing services Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Shared Lambda functions can help combat error message issues that arise when developers create custom authentication and authorization for microservices. Here's how they work. Continue Reading
Microservices have introduced a wave of security complexity. Before you run containerized microservices in production, carefully review these five critical security practices. Continue Reading
When it comes to testing software, many of today's organizations rely heavily on comprehensive testing, especially unit testing, to minimize the risk of outages. But in this session, Michalis ... Continue Reading