Tag: security
DevSecOps Implementation Process and Road Map – Security at Every Step
DevSecOps is changing our perspective toward security and is equipping us to deal with its challenges in an intelligible manner. The systematic approach of DevSecOps helps us add value to our business ...
Fail Fast: How Shifting Security Left Speeds Development
How DevSecOps can help organizations increase security, move faster and save money With developers under constant pressure to create more software in less time, the last thing you need is for your ...
How Software Outsourcing Can Empower Digital Transformation
Businesses are constantly readjusting themselves to become more agile and innovative while maximizing their opportunity in today’s digital economy. This is especially true for up-and-coming businesses with limited budgets that need to ...
Study: CISOs Need to Take Charge of DevOps Security
A new report from CyberArk looks at the complexity that goes into securing emerging DevOps environments, and why CISOs need to take charge to protect them. As digital transformation is pushing more ...
Salt Security Unveils Platform to Secure APIs
Salt Security, fresh off raising an additional $10 million in funding, announced a platform that promises to advance the state of DevSecOps by making it possible to detect when application programming interfaces (APIs) ...
IoT, Not People, Now the Weakest Link in Security
Do a quick search on “people weakest link” and you’ll see a raft of articles in which cybersecurity experts and computer scientists point to employees or end users as the biggest vulnerability ...
How to Turn Your DevSecOps Shift into Your ‘Pixar Moment’
If you have worked in security as long as I have, you have seen that vulnerabilities persist, despite years of attempts to fix them without changing how the organization operates. One of ...
DevOps Chat: Identity Management with ForgeRock’s Peter Barker
Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people ...
Blame Replaces Strategy: Enterprise IT War Rooms Causing Incalculable Losses
The concept of a “war room” is time-honored. One of the early examples is the Churchill War Rooms, an underground bunker that allowed Britain’s leaders to plot the allied route to victory ...
Building Amazing Apps, Part 1: Optimizing the Front End
There are millions of apps available today, and it’s incredibly easy for any user to download and install any of them with just a few taps on a screen or click of ...
Best of 2018: 5 Open Source SIEM Tools Worth Checking Out
As we close out 2018, we at DevOps.com wanted to highlight the five most popular articles of the year. Following is the second in our weeklong series of the Best of 2018 ...
What It Really Takes to Build Compliant Apps
If you search online for “software compliance,” you’ll be met with a seemingly endless lineup of blog posts, how-tos and explainer articles promising to tell you everything you need to know about ...