Sicurezza

Application Security in the Microservices Era

Pubblicato il

As organizations break their applications down into microservices, leveraging containers as the perfect architecture for it, the responsibility for securing these environments is shifting as well, exposing companies to a broader range of security risks and gaps in protection. Indeed, we are at an inflection point culturally between the role of DevOps and the CISO. […]

Sicurezza

Application Delivery Challenges for DevOps

Pubblicato il

Applications are at the core of interacting with today’s digital consumers and must constantly evolve to meet business demands. The average application development cycle, using traditional methodologies, takes three to six months for initial release, with subsequent releases taking an average of a few weeks. Time frames such as these are no longer satisfactory. One […]

Sicurezza

Automation for NetOps and DevOps

Pubblicato il

Many organizations use public cloud service providers, some in addition to their private cloud and on premise deployments. The right product mix not only reduces vendor lock-in and shadow IT, but is also an enabler for the constituents that includes IT administrators, network and security operations, as well as DevOps. Maintaining application security and configurations […]

Sicurezza

How to Move Security Up the DevOps Priority List

Pubblicato il

If you are in the information security business like me, you have probably improved your frequent flyer status recently. Indeed, May-June are when most industry events occur. Like birds, we fly when spring arrives. In this blog, I’ll share some thoughts based on conversations I had during my own journeys, including those at the global […]

Sicurezza

4 Emerging Challenges in Securing Modern Applications

Pubblicato il

Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered across different platforms and frameworks. To accelerate service development and business operations, applications rely on third-party resources that they interact with via APIs, well-orchestrated by state-of-the-art automation and synchronization tools. As a result, the attack […]

Sicurezza

Are Your DevOps Your Biggest Security Risks?

Pubblicato il

We have all heard the horror tales: a negligent (or uniformed) developer inadvertently exposes AWS API keys online, only for hackers to find those keys, penetrate the account and cause massive damage. But how common, in practice, are these breaches? Are they a legitimate threat, or just an urban legend for sleep-deprived IT staff? And […]

Sicurezza

The Executive Guide to Demystify Cybersecurity

Pubblicato il

WHAT DO BANKS AND CYBERSECURITY HAVE IN COMMON? EVERYTHING The world we live in can be a dangerous place, both physically and digitally. Our growing reliance on the Internet, technology and digitalization only makes our dependence ontechnology more perilous. As an executive, you’re facing pressure both internally (from customers and shareholders) and externally (from industry […]

Sicurezza

Marrying the Business Need With Technology Drive, Part Two: Security by Proxy or to Complicate

Pubblicato il

One of the biggest challenges we continue to see in the evolving cloud and DevOps world is around security and standards in general. The general lack of accumulated infrastructure knowledge coupled with the enthusiasm with which DevOps teams like to experiment is causing significant challenges for corporations in terms of standardization. This is leading to […]