Vendor Forum

February 13, 2024
Keith Pitt

The personality types you often encounter in software development organizations can be divided into two basic categories: poets and librarians. Poets are the creative types who dream up big ideas. Librarians make sure high-quality code gets built on time. Their goals and motivations differ, but great software results when they work together harmoniously ...

February 07, 2024
Jori Ramakers

As companies move more and more of their operations to the cloud, it becomes increasingly important to ensure data integrity is maintained during migration. Data integrity in cloud-based environments is essential to ensuring that data remains accurate, consistent, and intact during migrations or transfers. However, cloud migration can be especially risky ...

February 06, 2024
Deepak Anupalli

Agile development continually improves enterprise applications and shortens development time, helping companies stay competitive. Artificial intelligence (AI) automates processes to improve efficiency. Agile and AI low-code are naturally symbiotic, providing the means to streamline application development by building on existing software and components ...

February 05, 2024
Sitaram Iyer

The field of cloud native development is rapidly evolving, but during this shift to modern environments such as Kubernetes, many DevOps teams are putting security on the back burner in a rush to move to cloud native environments. This is opening the door to a wide array of new security risks and numerous opportunities for unscrupulous cybercriminals — and machine identities are a prime example of this ...

February 01, 2024
Bret Settle

The acceleration of digital transformation and subsequent rise in API, containerization, and multi-cloud deployments are creating a dynamic attack surface that's growing increasingly complex. Maintaining visibility to keep track of new, changed, unmanaged, or insecure APIs grows increasingly difficult ...

January 31, 2024
Simon Taylor

In today's hyper-connected and data-driven business landscape, Software as a Service (SaaS) applications are the backbone of enterprise operations. These applications play a pivotal role in driving innovation, enhancing productivity, and fueling growth. However we must underscore the criticality and role of data protection measures, particularly as they relate to the rise of SaaS use and proliferation across companies worldwide, to ensure the resilience and continuity of business operations ...

January 30, 2024
Scott Willson

If 2023 has proved anything in DevOps, it's that staying ahead of the curve is not a strategic choice but a necessity. The software development landscape has experienced a plethora of changes this past year, including the swift and widespread adoption of artificial intelligence, agile frameworks becoming mainstream, and evolving job roles within the DevOps sector. If 2023 was an opportunity to explore the enhanced DevOps methodologies that could expedite software delivery, 2024 is the year to embrace them wholeheartedly ...

January 29, 2024
Simon Ritter

Azul's State of Java Survey and Report 2023 uncovered several attention-getting results ...

January 25, 2024
Phil Buckellew
Rocket Software

For years, mainframe systems have served as the bedrock of enterprise networks, standing unmatched in terms of reliability, scalability, and data protection. But with emerging practices like DevOps, the rise of open-source, and the move to hybrid cloud models, security risks have become a pressing concern. With constantly changing rules and shifts in how software is developed and used, it's more important than ever to focus on mainframe security ...

January 18, 2024
Dotan Nahum
Check Point Software Technologies

Dark patterns, also known as deceptive design patterns, are user interfaces crafted to trick users into doing something they don't intend to, usually at their expense ... Surely this behavior is illegal? Well, sort of ...

January 16, 2024
Taylor McCaslin

If the use of AI is consigned to code generation, organizations may miss some of the most transformative opportunities for AI in software development. Let's walk through three ways to use AI in your DevSecOps workflows for faster cycle times and accelerated value stream delivery: predictive analytics, code testing and review, and security vulnerability detection ...

January 10, 2024
Scott Gerlach

While developers are facing internal pressure to build next-generation applications at astronomical speed, security teams are wrangling with an increasingly volatile cyber threat landscape, growing consumer concerns for applications built to secure their data, and the broad surface of threats they have to cover along with API security ... In most instances, the roadblocks faced by both teams comes down to a lack of clear communication and the absence of workflow policies and procedures, which often prove detrimental.So how can organizations start to bridge this gap and enable these teams to perform together at the highest level? ...

January 09, 2024
Dan Pinto

Developers can't afford to provide a subpar user experience — more than half of consumers said they would stop using a brand after just one bad encounter ... Device intelligence helps developers rise to these challenges by providing critical insights into real-time performance, usage patterns, and device and application health ...

January 08, 2024
Jack McCurdy

When setting out to build a new DevOps process for their application, many teams are filled with excitement and optimism about what they can achieve. But, months into an implementation, they're later frustrated when they can't secure the budget, buy-in or resources they need to put their new DevOps process into action. By involving key stakeholders early when building a new DevOps process, these blockers can be avoided ...

January 03, 2024
Dotan Nahum
Check Point Software Technologies

Lines of code bridge the gap between digital worlds, enabling seamless data sharing and functionality between different software systems. With this heightened interconnectivity, API security becomes paramount to protect sensitive data and ensure the integrity of digital services. While OAuth has been a widely adopted protocol for API security, it's essential to recognize that it alone may not suffice to address all security challenges. In fact, there are many limitations of OAuth and other advanced security measures to bolster API security ...


Subscribe to Vendor Forum