Sicurezza

Value Stream Mapping & Security in Software Development

Pubblicato il

The LEAN Enterprise management strategy puts value to the customer at the core. Once this is defined and established, it then suggests deploying business processes that will create this value, while optimizing the operation and minimizing idle time or any activity that does not contribute to that value. The popular practice to do so is […]

Sicurezza

Can DevSecOps Cover Holes Created by Digital Transformation?

Pubblicato il

Software Development Lifecycle (SLDC) is constantly improving, thanks to the availability of new ideas, tools, technologies, and mainly the formation of open source communities, driven by individuals and corporations alike. These tools boost business productivity and operational efficiency. Continuous deployment, where the SDLC is automated end-to-end – from the build, provisioning and even vulnerability scanning, […]

Sicurezza

Securing the Public Cloud When Your Workforce is Remote

Pubblicato il

To help enable business continuity during the COVID-19 pandemic, remote work has become a necessity wherever possible.  While shifting to remote work allows organizations to carry on, there is a downside: Remote employees are not protected by security controls that are typically available when working in the enterprise network. Indeed, the probability of stolen credentials, public exposures, and compliance breaches increases significantly when working remotely.  Organizations need an automated […]

Sicurezza

Application Security in the Microservices Era

Pubblicato il

As organizations break their applications down into microservices, leveraging containers as the perfect architecture for it, the responsibility for securing these environments is shifting as well, exposing companies to a broader range of security risks and gaps in protection. Indeed, we are at an inflection point culturally between the role of DevOps and the CISO. […]

Sicurezza

Application Delivery Challenges for DevOps

Pubblicato il

Applications are at the core of interacting with today’s digital consumers and must constantly evolve to meet business demands. The average application development cycle, using traditional methodologies, takes three to six months for initial release, with subsequent releases taking an average of a few weeks. Time frames such as these are no longer satisfactory. One […]

Sicurezza

Automation for NetOps and DevOps

Pubblicato il

Many organizations use public cloud service providers, some in addition to their private cloud and on premise deployments. The right product mix not only reduces vendor lock-in and shadow IT, but is also an enabler for the constituents that includes IT administrators, network and security operations, as well as DevOps. Maintaining application security and configurations […]

Sicurezza

How to Move Security Up the DevOps Priority List

Pubblicato il

If you are in the information security business like me, you have probably improved your frequent flyer status recently. Indeed, May-June are when most industry events occur. Like birds, we fly when spring arrives. In this blog, I’ll share some thoughts based on conversations I had during my own journeys, including those at the global […]

Sicurezza

4 Emerging Challenges in Securing Modern Applications

Pubblicato il

Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered across different platforms and frameworks. To accelerate service development and business operations, applications rely on third-party resources that they interact with via APIs, well-orchestrated by state-of-the-art automation and synchronization tools. As a result, the attack […]

Sicurezza

Are Your DevOps Your Biggest Security Risks?

Pubblicato il

We have all heard the horror tales: a negligent (or uniformed) developer inadvertently exposes AWS API keys online, only for hackers to find those keys, penetrate the account and cause massive damage. But how common, in practice, are these breaches? Are they a legitimate threat, or just an urban legend for sleep-deprived IT staff? And […]

Sicurezza

The Executive Guide to Demystify Cybersecurity

Pubblicato il

WHAT DO BANKS AND CYBERSECURITY HAVE IN COMMON? EVERYTHING The world we live in can be a dangerous place, both physically and digitally. Our growing reliance on the Internet, technology and digitalization only makes our dependence ontechnology more perilous. As an executive, you’re facing pressure both internally (from customers and shareholders) and externally (from industry […]