DevOps Security Best Practices

Continuous Integration : Building security into continuous integration starts with creating security-specific unit tests for critical section of code such as authentication, password management, validation routines and access control. Execute fast, accurate static and dynamic analysis scans for dangerous functions, OWASP Top 10 issues and vulnerable dependencies. Failed tests and high-risk vulnerabilities found in these…

15 Automotive IoT Attack Surface to watchout for!

Cars are likely the most complex connected devices we see. The attack surface is immense – The Internet, mobile, Bluetooth, custom RF protocols, DAB, media files imported over USB, remote diagnostics, telematics, mobile apps… the list goes on: [embedyt] https://www.youtube.com/embed?listType=playlist&list=PLCwnLq3tOElrdkQy_daR4wr9lJCt8c_C6&v=y4R3RizWN_8[/embedyt] What are the most common issues in these areas? Use of plaintext communications, allowing traffic…