DevOps Security
OAuth2 Identity Provider Setup: Complete Implementation Guide
SSOJet - Enterprise SSO & Identity Solutions | | Authentication, Breach, DEVOPS, programming, SAML, sso
Learn how to setup an OAuth2 Identity Provider for enterprise SSO. Detailed guide on implementation, security, and CIAM best practices for engineering leaders ...
Sonatype Named DevOps Dozen Winner for Best DevSecOps Solution
Sonatype | | AI, Artificial Intelligence, awards, DEVOPS, DevOps Dozen, DevSecOps, shift left, Software Composition Analysis
The DevOps landscape is changing faster than ever. As organizations race to deliver software at speed, they're also inheriting a new class of risk — one driven by open source sprawl, AI-generated ...
OAuth Authorization Server Setup: Implementation Guide & Configuration
SSOJet - Enterprise SSO & Identity Solutions | | Authentication, Breach, DEVOPS, OAuth, programming, sso
Learn how to build and configure an enterprise-grade OAuth authorization server. Covering PKCE, grant types, and CIAM best practices for secure SSO ...
Open Source Malware Index Q4 2025: Automation Overwhelms Ecosystems
Sonatype Security Research Team | | Everything Open Source, Malware, Malware Analysis, open source, open source management, open-source malware
As open source software continues to fortify modern applications, attackers are finding new and increasingly efficient ways to exploit the trust developers place in public ecosystems ...
Threat Actor Teases Source Code for Sale After Hack of Target Systems
Jeffrey Burt | | Chatbooks data breach, CI/CD tools, developer documentation, digital wallets, Git server, Gitea, GitHub, source code breach, target
Hackers posted online what they said were samples of about 860 GB of internal source code, developer documentation, and other data taken from systems of giant U.S. retailer Target and is reportedly ...
Security Boulevard
Session-Based Authentication vs Token-Based Authentication: Key Differences Explained
SSOJet - Enterprise SSO & Identity Solutions | | Authentication, Breach, DEVOPS, programming, SAML, sso
Detailed comparison of session-based and token-based authentication for enterprise SSO. Learn about scalability, security, and CIAM best practices ...
Securing India’s “Pharmacy of the World”:
The Cybersecurity Imperative for Indian Pharma Manufacturing in 2025 India’s pharmaceutical manufacturing sector is a cornerstone of global healthcare. As the world’s largest supplier of generic medicines and a critical hub for ...
AI and the End of the Traditional Entry-Level Tech Job
Tom Eston | | AI, AI Integration, Artificial Intelligence, Automation, Career Adaptation, Career Path, Career Strategy, Communication Skills, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Entry Level Tech Careers, Episodes, Future of work, Information Security, Infosec, Job Market, Knowledge Worker, Mentorship, New Graduates, Oversight, Podcast, Podcasts, Privacy, prompt engineering, security, Software Development, technology, Technology Field, Transferable Skills, Weekly Edition
Welcome to the first episode of the Shared Security Podcast in 2026! As AI becomes increasingly integrated into technical fields such as software development and cybersecurity, traditional entry-level roles are evolving or ...
Outpace Malware, Build Faster, and Secure Software With Real-Time Protection
Aaron Linskens | | CVE, Malware, open source, open-source malware, Security Vulnerabilities, Sonatype Repository Firewall
Modern software teams are under pressure to move fast, innovate faster, and deliver continuously. At the same time, attackers are evolving just as quickly, and in many cases, faster than the tools ...
Types of Authentication: Complete Guide to Authentication Methods & Mechanisms
SSOJet - Enterprise SSO & Identity Solutions | | Authentication, Breach, DEVOPS, programming, SAML, sso
Explore various types of authentication methods including MFA, SSO, and Biometrics. Learn how to secure enterprise apps and prevent data breach ...




