Editor’s picksfeatureSpotlight report: Securing the cloudThis Special Report explores cloud security’s unique challenges, the extent of the threats facing organizations today, and how the rapid adoption of AI is amplifying the problem. You’ll learn where to look for hidden risks and essential strategies and best practices for securing your cloud environment. By InfoWorld StaffOct 1, 20251 minCloud ComputingCloud SecuritySecurity analysis Why are we still confused about cloud security?By David LinthicumOct 15, 20245 minsCloud SecurityIdentity and Access ManagementSecurity Infrastructureanalysis Risk management in the public cloud is your jobBy David LinthicumJul 4, 20256 minsHybrid CloudMulticloudRisk Management analysisThe hidden threat of neglected cloud infrastructureBy David Linthicum Feb 7, 20255 minsCloud ComputingCloud ManagementCloud Security analysisA CISO game plan for cloud securityBy David Linthicum Jun 11, 20244 minsCareersCloud ComputingCloud Security analysisOverseas enterprises and US sovereign cloudsBy David Linthicum Sep 2, 20256 minsHybrid CloudMulticloudTechnology Industry featureCNAPP buyer’s guide: Top cloud-native app protection platforms comparedBy David Strom Apr 23, 20251 minApplication SecurityCloud Security featureCloud security conundrum: Buy vs. build vs. bothBy Tyler Farrar Apr 30, 20251 minCloud Security news analysisCloud assets have 115 vulnerabilities on average — some several years oldBy Lucian Constantin Jun 9, 20251 minCloud Security Latest from todayanalysisThe JavaScript code won’t write itselfThis month’s theme is: Keep an eye on the future but hone your coding craft in the now. Start here, with nine timeless JavaScript coding concepts, a look at Nitro.js—fast becoming the go-to server option for JavaScript and Node—and more.By Matthew TysonOct 3, 20253 minsGenerative AIJavaScriptWeb Development news Chainguard offers malware-resistant JavaScript librariesBy Paul KrillOct 2, 20252 minsGenerative AIJavaScriptWeb Developmentfeature ‘Blame the intern’ is not an agentic AI security strategyBy Jed SalazarSep 30, 20258 minsArtificial IntelligenceData and Information SecurityGenerative AI analysisWhen personal ambitions undermine enterprise securityBy David Linthicum Sep 30, 20255 minsCloud SecurityData and Information SecurityIT Skills newsQR codes become the vehicle for malware in new techniqueBy Taryn Plumb Sep 23, 20254 minsDevelopment ToolsGitHubMalware analysisVibe coding and the future of software developmentBy Isaac Sacolick Sep 23, 202511 minsDevSecOpsDevelopment ToolsGenerative AI opinionNPM attacks and the security of software supply chainsBy Matt Asay Sep 22, 20257 minsCyberattacksOpen SourceSecurity Practices featureDesigning AI-ready architectures in compliance-heavy environmentsBy Rama Devi Drakshpalli Sep 18, 202512 minsArtificial IntelligenceData GovernanceData and Information Security analysisAre cloud providers neglecting security to chase AI? By David Linthicum Sep 16, 20256 minsCloud SecurityGenerative AIHybrid Cloud ArticlesopinionMore hardware won’t fix bad engineeringEngineering fundamentals aren’t just for computer science students. They pay huge dividends in both your systems’ service levels and your company’s balance sheet.By Matt Asay Sep 15, 2025 6 minsDeveloperEngineerTechnology IndustrynewsWhen AI nukes your database: The dark side of vibe codingAs developers lean on Copilot and GhostWriter, experts warn of insecure defaults, hallucinated dependencies, and attacks that slip past traditional defenses.By Shweta Sharma Sep 9, 2025 1 minDeveloperGenerative AISecuritynewsGoogle to add developer verification requirement for Android appsScheduled for rollout starting in September 2026, the program aims to restrict malware distribution by requiring developer verification for apps installed on Android devices. By Paul Krill Sep 2, 2025 2 minsAndroid SecurityMalwareMobile DevelopmentanalysisThree tips for building agentic AI systems on cloud platformsBuilding truly agentic AI in the cloud means designing for robust control, seamless integration, and continuous adaptation to ensure AI operates safely and effectively.By David Linthicum Aug 29, 2025 5 minsArtificial IntelligenceCloud-NativeIdentity and Access ManagementbrandpostSponsored by IDCKazakhstan’s SOS 102: Redefining Public Safety Through InnovationBy IDC Jan 23, 2025 4 minsSecuritynewsWave of npm supply chain attacks exposes thousands of enterprise developer credentialsAttacks on the NX build system and React packages highlight escalating threats to enterprise software development pipelines.By Gyana Swain Aug 28, 2025 5 minsApplication SecurityJavaScriptfeature8 vendors bringing AI to devsecops and application securityFrom autonomous vulnerability remediation to real-time scrutiny of AI-generated code, AI is impacting security at every stage of the software development process.By Victor Garza Aug 28, 2025 14 minsApplication SecurityDevSecOpsGenerative AInewsCritical Docker Desktop flaw allows container escapeMissing authentication on the Docker Engine management API for Docker Desktop on Windows and Mac allows attackers to break out from containers and potentially execute malicious code on the underlying host system.By Lucian Constantin Aug 26, 2025 4 minsContainersDevSecOpsDockeranalysisHow does AI affect cloud attack vectors?Most organizations are unaware of how vulnerable their cloud systems have become. Gaps in preparation could cause serious problems as generative and agentic AI create new attack points.By David Linthicum Aug 26, 2025 6 minsArtificial IntelligenceCloud ComputingCloud SecurityfeatureA wake-up call for identity security in devopsThe GitHub OAuth attack exposed a security blind spot in the ever-growing web of permissions spanning developers, service accounts, and third-party OAuth apps. Here’s how to address it. By Taylor Parsons Aug 26, 2025 7 minsApplication SecurityAuthenticationData and Information SecurityfeatureSecuring AI workloads in Azure: A zero-trust architecture for MLOpsLocking down AI pipelines in Azure? A zero-trust, metadata-driven setup makes it secure, scalable and actually team-friendly.By Vikram Garg Aug 25, 2025 6 minsData GovernanceData and Information SecurityMicrosoft AzureanalysisIBM can’t afford an unreliable cloud Frequent IBM Cloud outages reveal systemic weaknesses in its control pane, putting its hybrid cloud strategy and customer trust at risk. By David Linthicum Aug 19, 2025 5 minsAccess ControlHybrid CloudIdentity and Access ManagementanalysisCan your cloud provider really scale? The service disruption in the Azure East US region reveals capacity problems that are happening more often. Enterprises need to rethink their strategies, enforce stricter SLAs, and accept that public clouds are still vulnerable.By David Linthicum Aug 15, 2025 5 minsCritical InfrastructureHybrid CloudTechnology Industry Show more Show less View all Video on demand video Make Python apps redistributable with PyCrucible A new Rust-powered tool, PyCrucible, lets you take Python apps and packages and turn them into click-to-run executables — without needing Python installed on the target system, and without needing the Rust compiler either. See how this elegant (if still minimal) tool can deploy a Python program with only a few steps on the developer’s part. Oct 1, 2025 3 minsPython Python 3.14’s live debugging interface Sep 23, 2025 4 mins Python Easier Chrome browser automation with PyDoll Sep 16, 2025 4 mins Python How to use Rust workspaces to speed up compile times Sep 9, 2025 3 mins Python See all videos Explore a topicAnalyticsArtificial IntelligenceCareersCloud ComputingData ManagementDatabasesDevelopment ToolsDevopsEmerging TechnologyGenerative AIJavaJavaScriptMicrosoft .NETOpen SourceView all topics Show me moreLatestArticlesVideos news IBM launches Granite 4.0 to cut AI infra costs with hybrid Mamba-transformer models By Gyana SwainOct 3, 20256 mins Artificial Intelligence feature What is an internal developer platform? IDP explained By Josh Fruhlinger and Scott CareyOct 3, 20258 mins CI/CDDevopsPaaS analysis Who stops wasteful cloud spending? By David LinthicumOct 3, 20255 mins Cloud ComputingCloud ManagementIT Leadership video Getting encryption wrong (and getting it right, too) Sep 2, 20257 mins Python video How to build a native desktop app vs. a web UI app Aug 25, 20254 mins Python video PyApp: Build click-to-run Python apps with Rust Aug 15, 20255 mins Python