Vendor Forum

March 04, 2019
Eric Sheridan
WhiteHat Security

Step 6 of the Twelve-Factor App methodology encourages executing the app as one or more stateless processes. Here is some actionable security-focused advice which developers and ops engineers can follow during the SaaS build and operations stages ...

February 28, 2019
Taylor Armerding
Synopsys

Given the risks, container security presents unique challenges. But the right tools, practices, and strategies can overcome them. As is the case with any security initiative, there is no silver bullet that will guarantee security of containerized applications, so organizations should use a combination of techniques and solutions suited to their IT governance requirements. Here are some common approaches, including their pros and cons ...

February 27, 2019
Taylor Armerding
Synopsys

To design an effective container security strategy, organizations first need to understand the risks that attackers could exploit to make them leak. If you don't know the risks, how can you avoid them? Here are a few ...

February 25, 2019
Tushar Patel
Cleo

In a digital survey on integration challenges, the respondents were very forthcoming about the state of their current integration solutions and their roles in driving business outcomes. The consensus was that many of their solutions – the bulk of which are homegrown or greatly modified with custom code – are costly to maintain, require specific skill sets, are susceptible to data errors, and jeopardize business opportunities ...

February 21, 2019
Shira Sagiv
Radware

Without question, cyberattacks represent a viable threat to a business' bottom line. A new report from Radware shows that security professionals estimate the average cost of a cyberattack in excess of $1.1M. For those organizations that calculate (versus estimate) the cost of an attack, that number increases to $1.67M. The resulting business impacts? Just as alarming ...

February 19, 2019
Brian Jenkins
StrongKey

In the fast-moving world of DevOps, security sometimes got left by the wayside on the way to the next iteration. But today's threat landscape is so perilous that developers need to have solid security top of mind as they design and build applications. This includes features like user authentication, digital signatures, and encryption ...

February 14, 2019
Matt Hilbert
Redgate Software

While DevOps has increasingly been adopted across many organizations, it is now becoming central to how they operate — and is maturing to include the database in DevOps flows. That is the headline finding from Redgate's third State of Database DevOps Report. Looking through the results, there are four clear conclusions for everyone involved in DevOps ...

February 13, 2019
Michael Hackett
LogiGear

DevOps continues to gain significant momentum as teams look to master Continuous Integration and Continuous Delivery (CI/CD). This is transforming how and what is being developed and released. As a result, software development teams and organizations continue to undergo rapid change. Not only that, but teams are also getting increasingly more diverse, in location, generation, gender and culture. So how do the technical and people managers in DevOps adjust? ...

February 11, 2019
Eran Kinsbruner
Perfecto by Perforce

With so many people relying so heavily on apps, it is critical for developers to assure continuous quality throughout the entire software development life cycle. And it all starts with testing ...

February 07, 2019
Murli Thirumale
Portworx

Containers have reshaped the technology landscape in the past year. Picking up where virtualization left off, they have brought new levels of portability to cloud deployments and ushered in the move to microservices, making it easier to break applications into smaller parts that can be updated more frequently and with less disruption. But what does container deployment really look like in the enterprise and what does it mean for 2019? ...

February 04, 2019
Ronit Belson
Rollout

One of the latest trends is the movement towards continuous development and the need for feature flags to enable that. We knew that feature flags enable developers to move fast while breaking nothing. But we also wanted to know ...

January 24, 2019
Bob Davis
Plutora

The advent of the value stream has helped enable organizations to look at how they optimize their portfolios, and to focus on the strategic objectives that senior management want to have visibility of. Once an organization has identified these value streams, it becomes imperative to capture, visualize, analyze and optimize critical indicators of speed and quality of your software delivery through value stream management ...

January 22, 2019
Ari Weil
Akamai

In 2019, competitive disruption will drive remaining laggards to a DevOps boiling point. As the industry moves to the plateau of productivity with DevOps automation and standard tooling, laggard executives will reach a management crisis point that will force actions ...

January 14, 2019
Mark Moore
Threat Stack

Budget season is an important time of the year for businesses because it gives senior IT and security leaders time to reflect on what went right this year and what initiatives need to be given priority in the new year. Recent research from Threat Stack shows security budgets are expected to increase by 19 percent over the next two years, but business leaders are still facing challenges determining where to allocate this budget in the face of rapidly evolving infrastructure ...

January 10, 2019
Ranny Nachmias
Alcide

As organizations of all sizes are embracing hybrid and multi-cloud infrastructures, they are experiencing the many benefits of a more agile, distributed and high-speed environment where new applications and services can be built and delivered in days and weeks, rather than months and years. But as the adoption of these next generation architectures continues to grow, so do the complexities of securing the cloud workloads running on them ...

Pages

Subscribe to Vendor Forum