News

Find some of the latest software news, sector insight and much more
Microservices Security: Protecting API Endpoints in a Distributed World
Microservices have transformed how modern applications are developed and deployed. By breaking large systems into smaller, independent services, organisations can scale faster, update incrementally, and adapt to market needs with agility. But this architectural evolution also brings a profound shift in the security landscape—particularly at the API layer, where microservices communicate.
See more
Secrets in Motion: Securing Credentials in Event-Driven and Serverless Architectures
As organisations race to modernise and adopt serverless computing and event-driven architectures, they unlock a new realm of agility, scalability, and cost efficiency. These paradigms promise frictionless scaling, near-instant execution, and seamless responsiveness to real-time demands. However, buried within these advances lies a subtle but growing threat—secrets in motion. Unlike static infrastructures, these new architectures operate on transient workloads, with credentials moving rapidly between services, environments, and memory states. And therein lies the risk: secrets are no longer only at rest—they are constantly in flight, dynamic, and difficult to govern.
See more
Beyond Vulnerability Scanning: Building an Effective Exploit Prevention Strategy
In the high-velocity world of DevSecOps, vulnerability scanning has become a foundational control. It identifies known weaknesses, helps prioritise remediation, and ticks compliance boxes. But in the evolving threat landscape, scanning alone is no longer enough. While it may detect Common Vulnerabilities and Exposures (CVEs), it often fails to identify actual exploitable paths—especially those born from configuration drift, logical errors, or interconnected weaknesses.
See more
DevSecOps for Legacy Systems: Modern Security in Outdated Infrastructure
In the race toward digital transformation, many organisations find themselves building the future on top of the past. Legacy systems—some decades old—remain essential to critical business processes. Yet these platforms were never designed for the speed, scale, or threat landscape of modern software delivery. While DevSecOps has enabled agility, automation, and continuous security for cloud-native systems, legacy infrastructure often remains static, opaque, and vulnerable.
See more
The Forgotten Environments: Securing Staging, Test, and QA Before They Become Attack Vectors
In most organisations, security investment and attention are squarely aimed at production environments. This makes intuitive sense—production systems hold customer data, run core business processes, and are the most visible targets in the event of a breach. But this laser focus can leave critical blind spots elsewhere in the software delivery pipeline. Environments like staging, testing, and quality assurance (QA) are often treated as low-risk, low-priority, or temporary. In reality, they are soft targets—and attackers know it.
See more
The DevSecOps Skills Gap: Closing the Divide Between Code and Security Know-How
DevSecOps promises a world where security is no longer bolted on at the end of development, but integrated into every step of the software lifecycle. It demands a blend of engineering fluency, security expertise, and operational awareness—a unified mindset across what have traditionally been separate domains. Yet most organisations still operate in functional silos. Developers write code. Security audits after the fact. Operations keep systems running. This separation has become a source of growing risk, as the gap between disciplines widens in the face of rapid digital delivery.
See more
Identity Crisis: Managing Machine and Human Identities in DevSecOps
In today’s dynamic DevSecOps environments, the traditional understanding of identity management is under pressure. It is no longer sufficient to secure human logins and employee credentials alone. Modern digital infrastructure is populated with a growing array of non-human actors—microservices, automation scripts, CI/CD tools, containers, infrastructure-as-code modules—all of which require access to resources and systems. Each one represents a potential entry point. Each one demands its own identity.
See more
Compliance at Velocity: Reconciling Continuous Delivery with Continuous Governance
In today’s fast-paced digital economy, software delivery cycles are accelerating at an unprecedented rate. Enterprises that once released updates quarterly now deploy changes weekly, daily—even hourly. Continuous integration and continuous delivery (CI/CD) pipelines, cloud-native architectures, and DevSecOps practices have made agility a core capability. But amid all this progress, one critical function is struggling to keep up: compliance.
See more
Secure Infrastructure-as-Code (IaC) Practices
Infrastructure-as-Code (IaC) has revolutionised the way modern organisations build, scale, and manage infrastructure. By transforming infrastructure into programmable code, IaC enables rapid provisioning, consistency, and automation. But with this power comes new responsibility. What once required manual oversight by experienced operations teams is now handled by scripts—and if those scripts are flawed, the consequences are fast, invisible, and potentially catastrophic.
See more
Insider Threats in DevSecOps Environments
While much of the cybersecurity conversation focuses on external threats—ransomware gangs, state-sponsored actors, and zero-day exploits—organisations too often overlook the danger that resides within. Insider threats pose one of the most insidious and damaging risks to DevSecOps environments. They are difficult to detect, devastating when executed, and disproportionately difficult to contain once initiated.
See more