Where in the DevOps cycle do you do security? The short answer: everywhere. Here's how to implement a strategy.
Purple testing and chaos engineering in security experimentation Here's how red/purple team testing and chaos engineering complement each other to form a strong security experimentation strategy.
The state of encryption: How the debate has shifted Long-term leader in the encryption fight, Susan Landau, shares her insights.
How insecure is your router? Your router is your first point of contact with the internet. How much is it increasing your risk?
An introduction to cryptography and public key infrastructure Learn the basic concepts behind cryptography, with a focus on confidentiality, integrity, and authenticity.
Security and privacy: Do you know what's lurking on your system? Every utility, every library, every executable increases your attack surface.