Securing your Code for Production

When designing cloud-native security, you should start with the assumption that all systems can be compromised. The 4Cs (Cloud, Cluster, Container, Code) of cloud-native security adopt the defense in depth approach and divides it into four layers.

Posted July 8, 2021 by Sharjeel Aziz ‐ 3 min read

Container Scanning with Trivy in Jenkins

With unrelenting attacks from malicious hackers on business critical software and infrastructure, the "Shift-left" approach for security testing is gaining more momentum inside the enterprises.

Posted July 2, 2021 by Faheem Memon ‐ 4 min read