Docker Deep Dive Series - Part 6: Docker Security Best Practices

Welcome to Part 6 of our Docker Deep Dive Series! In this installment, we will explore Docker security best practices to help you secure your containerized applications and environments. Use Official Images Whenever possible, use official Docker images from trusted sources like Docker Hub. These images are maintained and regularly updated for security patches. Keep Docker Up to Date Ensure you’re using the latest version of Docker to benefit from security enhancements and bug fixes....

September 27, 2023 · 2 min · 398 words · AO

The Role of DevSecOps in Modern Software Development

As the world becomes increasingly digital, software development has become a critical aspect of business success. However, the rise in cybersecurity threats has made it imperative to ensure that software is developed securely. This is where DevSecOps comes in – it is the integration of security practices into the DevOps process, allowing for more secure and reliable software development. In this blog post, we will discuss the role of DevSecOps in modern software development....

April 28, 2023 · 4 min · 771 words · AO

Network systems security risks

Networking has played a vital part in the transfer of information as well as the accessibility of information that was never available to previous generations with the rapid increase of internet-connected devices. Along with the benefits of computing devices being connected to one another for information sharing, online shopping and many other helpful tasks, there is also a real threat present. This is termed under the overarching “Network Security” realm of topics....

May 25, 2020 · 4 min · 787 words · Andrew

Why Password Managers are Not the Solution

Why a Password Manager? Password managers exist for two main reasons. Firstly, to generate strong passwords and secondly so that you don’t end up using the same password on all your websites or apps that you frequent. On the surface, that sounds like a pretty good idea. Imagine you use the same password for a number of websites, then one of those websites gets hacked. The hackers will now try the same credentials on a range of sites....

March 15, 2020 · 1 min · 201 words · Andrew

Auditing Organisational Information Systems – Security

Auditing an organisation?s information systems is a vital part of operating a business at any decent scale. Particularly from a security standpoint (Mohamed ElBorno, n.d.). Information systems have many different facets and each organisation operates slightly differently, so while auditing can be handled the same on general shared traits, more bespoke business units and organisational structures should be taken into account when designing a well thought out auditing system that fully guarantees the security of an organisation?...

September 17, 2017 · 3 min · 511 words · Andrew