Archives for February 2022
Month: February 2022

How to Build an Effective API Security Strategy
Application Programming Interfaces (APIs) enable organizations to grow their businesses and drive innovation. APIs allow applications to easily transfer data to external third-party developers, business partners and internal departments. Since APIs have ...

What to Expect When Transitioning to DevSecOps
How do you ensure your DevOps pipeline is secure? Does DevSecOps protect you against serious breaches or is it just a way to allay the concerns of stakeholders about security in DevOps? ...

Tricentis Expands Scope of Cloud-Based Testing Tools
Tricentis this week extended a suite of cloud-based testing tools that promise to make it simpler to both develop cloud-native and mobile applications and migrate existing applications to the cloud. New capabilities ...

How SREs Benefit From Feature Flags
When you think of who uses feature flags, your mind most likely goes to software developers. In general, feature flags are closely associated with software engineering. But site reliability engineers (SREs), too, ...

SQL Server MDF to NDF Distribution
Do you have massive MDF files on your database? Have you noticed that your SQL Server disk stall metrics for these data files are higher than the storage latency metrics exhibited on ...

Akamai: Buying Linode | Firefox: Not OK | Gone: Google Vaccine Mandate
In this week’s The Long View: Linode bought by Akamai, Firefox market share “measly,” and Google brings staff back to the office ...

How to Mitigate Software Supply Chain Risks
As new vulnerabilities are discovered on a daily basis, DevOps teams must integrate security into the early stages of the development lifecycle and be vigilant about what elements are incorporated into their ...

Top Nine Skills for SREs to Master
It’s easy to talk at a high level about what site reliability engineers do: They ensure that IT systems achieve availability and performance requirements. But which skills, exactly, do SREs need to ...

Can Regulatory Mandates Secure Software Development?
Software companies have a long history of delivering incomplete and insecure products. This happens for a couple of reasons. Fast time-to-market has always been a business priority, taking precedence over security, especially ...

How to Seamlessly Transition to DevSecOps
In the last few months, the cybersecurity world has been taken by storm following the discovery of the Log4Shell vulnerability. The zero-day had the potential to put much of the connected world ...