Tag: IT security
Four Trends Defining the Observability Market in 2023
Observability is a market that has grown exponentially over the past few years. It started as a buzzword in late 2015 and early 2016, and since then we’ve seen dozens of insurgent ...
Codenotary Previews Secure SBOM Creation Service
Codenotary today made available a preview of a centralized repository service for generating and storing software bills of materials (SBOMs) that makes it simpler to securely share them as necessary. Moshe Bar, ...
Business Leaders Will Trade Speed for Security
A global survey of 600 C-level executives conducted by CloudBees found that when it comes to building software, more than three-quarters of respondents said it is more important to be secure and ...
Tips for a Successful DevSecOps Life Cycle
A DevOps implementation, if done correctly, can do wonders for any organization that's on the hunt for efficiency, productivity and speed. As per the 2020 survey conducted by Atlassian, 99% of survey ...
AIOps Greasing the Wheel of Digital Security amid COVID-19
Amid the most challenging era for business infrastructures and transformations, AIOps (AI for IT Operations) can help industries operating in the digital environment to be vigilant when it comes to network operations ...
Who’s Responsible for Security? Apparently, It Depends
More than 10 years after organizations began implementing DevOps, responsibility for security still resembles the proverbial chicken and egg dilemma. GitLab's 2020 Global DevSecOps Survey asked developers, security team members, operations pros and ...
DevSecOps: A Renewed Commitment to Secure Delivery, Part 2
If done right, DevSecOps eliminates the cultural roadblocks that often prevent organizations from getting IT security proactively involved with development and operations. Barriers are the last thing any organization should contend with ...
DevSecOps: A Renewed Commitment to Secure Delivery, Part 1
Security has never been as high a priority than it is today, as companies fear they’ll be the next headline, the next victim of a data breach. Executives also worry about applications ...
Moving Security Beyond SSH and PKI
SSH (secure shell) is still the most common method of remotely accessing a Linux server, which makes it a common target for attackers attempting to infiltrate corporate networks. While the protocol itself ...
Q&A: Michael Beckley, CTO/CCO, Appian
Recently I had the chance to speak with Michael Beckley, chief technical officer and chief customer officer at Appian, about his company's move to go public and the DevOps space in general ...
Improve IT Security by Improving Company Culture
All around the world, cybercrime rates are rising, and it’s clear that traditional criminals are constantly developing new ways to attack. These days, wreaking havoc requires nothing more than internet connectivity and ...
Meeting the Need for Speed in Cyber Threat Response
In the very early days of the internet, hackers most likely were "lone wolves." They might be an unhappy customer, a disgruntled employee or a tech-savvy youth who just wanted to see ...