Legit Security this week added a dashboard to its application security posture management (ASPM) platform that makes it simpler to correlate the creation of a vulnerability to a specific application development team. Source: DevOps.com
0 CommentsMicrosoft expands its Hyperlight project with Hyperlight Wasm, enabling secure WebAssembly workloads in lightweight VMs across Windows, Linux, and macOS platforms. Source: DevOps.com
0 CommentsCary, North Carolina, 27th March 2025, CyberNewsWire Source: DevOps.com
0 CommentsPulumi today extended the reach of its Environments, Secrets and Configurations (ESC) platform for managing infrastructure-as-code (IaC) into the realm of DevSecOps by adding the ability to manage secrets and implement policies. Source: DevOps.com
0 CommentsImandra today launched an artificial intelligence (AI) agent, dubbed CodeLogician, that uses symbolic models to transform source code into mathematical models that can then be validated and tested in a way that is more accurate than relying on a large language model (LLM). Source: DevOps.com
0 CommentsControlMonkey today added a disaster recovery module to its namesake software-as-a-service (SaaS) platform for automating the management of infrastructure-as-code tools based on open-source Terraform software. Company CEO Aharon Twizer said that Automate Disaster Recovery makes it possible to reduce by 90% the amount of time required to restore cloud configurations, networking, security policies and other […]
0 CommentsCary, NC, 24th March 2025, CyberNewsWire Source: DevOps.com
0 CommentsGoogle’s OSV-Scanner V2.0.0 brings enhanced vulnerability scanning with container support, interactive visualizations, and innovative remediation features. Source: DevOps.com
0 CommentsGitLab 17.10 introduces Duo Code Review and Root Cause Analysis for self-hosted environments, along with enhanced metrics visualization and markdown improvements. Source: DevOps.com
0 CommentsRebranding DAST isn’t about slapping a new label on the same old toolset — it is about demanding more from vendors and shifting the way we think about security testing. Source: DevOps.com
0 Comments