Latest Articles

Developer’s Guide to Web Application Security
When it comes to security, there are many vulnerabilities that can leave your website or web app open to attack. In this article, we'll go over 15 common web application security vulnerabilities ...

Cloudflare Outage Outrage | Yet More FAA 5G Stupidity
In this week’s The Long View: Cloudflare suffers another huge outage while the FAA and FCC still disagree over 5G/NR near airports ...

ShiftLeft Report Reveals State of Application Security
A report published today by automated application security testing platform ShiftLeft found only one in three applications has an attackable vulnerability. The report also found organizations that prioritized their remediation efforts based ...

Survey Sees Alternative Cloud Service Providers Gaining Ground
A survey of 458 development professionals, managers and senior leaders conducted by Techstrong Research, a sister entity of DevOps.com, found 43% are considering adding additional cloud service providers in the next 12 ...

What the New OWASP Top 10 Changes Mean to Devs
The open web application security project (OWASP) recently updated its top 10 list of the most critical security risks to web applications after four years. It represents the most radical shake-up since ...

Survey Shows Correlation Between Open Source, DevOps Skills Demand
A survey published this week by the Linux Foundation suggested enterprise IT organizations now prefer to hire IT professionals that have both open source software and DevOps experience. Conducted in collaboration with ...

The Age of Software Supply Chain Disruption
The software supply chain is swiftly becoming a widespread attack vector, and securing it is now in the spotlight. Software supply chain attacks have become a given in 2022, reports Darktrace. SolarWinds, ...

Four Steps to Avoiding a Cloud Cost Incident
The recent Flexera 2022 State of the Cloud Report found that organizations waste 32% of their cloud spend, up from 3o% last year. This can be due to cloud cost incidents triggered ...

At Some Point, We’ve Shifted Too Far Left
Those of us involved in DevOps have a tendency to see the world with blinders on. It is rather easy to fall into the “If all you have is a hammer, everything ...

Survey Uncovers Depth of Open Source Software Insecurity
A survey from Snyk and the Linux Foundation published today found that less than half of respondents (49%) work for organizations that have security policies in place for the use or development ...

TechStrong Con: Downturn Brings Additional Sense of DevOps Urgency
Regardless of whether the overall economy is experiencing a correction or is on the cusp of a recession, organizations are going to prioritize some projects over others as resources become more constrained ...