Vendor Forum

January 25, 2024
Phil Buckellew
Rocket Software

For years, mainframe systems have served as the bedrock of enterprise networks, standing unmatched in terms of reliability, scalability, and data protection. But with emerging practices like DevOps, the rise of open-source, and the move to hybrid cloud models, security risks have become a pressing concern. With constantly changing rules and shifts in how software is developed and used, it's more important than ever to focus on mainframe security ...

January 18, 2024
Dotan Nahum
Check Point Software Technologies

Dark patterns, also known as deceptive design patterns, are user interfaces crafted to trick users into doing something they don't intend to, usually at their expense ... Surely this behavior is illegal? Well, sort of ...

January 16, 2024
Taylor McCaslin
GitLab

If the use of AI is consigned to code generation, organizations may miss some of the most transformative opportunities for AI in software development. Let's walk through three ways to use AI in your DevSecOps workflows for faster cycle times and accelerated value stream delivery: predictive analytics, code testing and review, and security vulnerability detection ...

January 10, 2024
Scott Gerlach
StackHawk

While developers are facing internal pressure to build next-generation applications at astronomical speed, security teams are wrangling with an increasingly volatile cyber threat landscape, growing consumer concerns for applications built to secure their data, and the broad surface of threats they have to cover along with API security ... In most instances, the roadblocks faced by both teams comes down to a lack of clear communication and the absence of workflow policies and procedures, which often prove detrimental.So how can organizations start to bridge this gap and enable these teams to perform together at the highest level? ...

January 09, 2024
Dan Pinto
Fingerprint

Developers can't afford to provide a subpar user experience — more than half of consumers said they would stop using a brand after just one bad encounter ... Device intelligence helps developers rise to these challenges by providing critical insights into real-time performance, usage patterns, and device and application health ...

January 08, 2024
Jack McCurdy
Gearset

When setting out to build a new DevOps process for their application, many teams are filled with excitement and optimism about what they can achieve. But, months into an implementation, they're later frustrated when they can't secure the budget, buy-in or resources they need to put their new DevOps process into action. By involving key stakeholders early when building a new DevOps process, these blockers can be avoided ...

January 03, 2024
Dotan Nahum
Check Point Software Technologies

Lines of code bridge the gap between digital worlds, enabling seamless data sharing and functionality between different software systems. With this heightened interconnectivity, API security becomes paramount to protect sensitive data and ensure the integrity of digital services. While OAuth has been a widely adopted protocol for API security, it's essential to recognize that it alone may not suffice to address all security challenges. In fact, there are many limitations of OAuth and other advanced security measures to bolster API security ...

November 29, 2023
Lebin Cheng
Imperva

The OWASP Foundation updated the API Security Top 10 list for 2023, outlining the most critical security risks for APIs in production. The updated guidance highlights just how much the API security landscape has changed since the original list was published in 2019 — including the rapid rise of business logic attacks (BLAs). Three of the top five categories on the Top 10 list are now related to business logic abuse, compared to just two in 2019. The updated list underscores the fact that if organizations want to bolster their API security, implementing safeguards capable of detecting and remediating abuse of business logic needs to be a priority ...

November 27, 2023
Jeff Martin
Mend

Recent research conducted by ESG and sponsored by Mend.io found just 52% of companies can effectively remediate a critical vulnerability — and even fewer (42%) are confident in their ability to manage the security and compliance risks associated with open-source software ...

November 21, 2023
Dotan Nahum
Check Point Software Technologies

Cyberattacks are publicized much more frequently than the hard work security teams put in to stop them. 2017's WannaCry and 2022's Log4Shell were amplified by companies' failures to install readily available patches, causing highly destructive, expensive, and embarrassing consequences for victim organizations ...

November 20, 2023
Dave Sudia
Ambassador Labs

The largest takeaway we should all be focused on for 2024 is this: Kubernetes technology is on a rapid growth trajectory ... In fact, 80% of developers surveyed in DZone's annual Kubernetes in the Enterprise 2023 report expressed that their organization was currently running Kubernetes clusters, and the report suggests that the Kubernetes industry may be close to reaching its saturation point ...

November 16, 2023
Stephen Feloney
Perforce Software

Companies have touted AI's ability to make employees more productive and efficient, personalize services and experiences, and improve quality while decreasing human error. And today, many organizations also realize the competitive advantage of utilizing AI in workflows, especially in web and mobile application performance testing ...

November 15, 2023
Daniel Balla
Bitrise

More than 1,300 mobile practitioners shared a look inside their organizations' mobile strategies and revealed that just 8% of their companies have a dedicated team for mobile app development. While this may seem contradictory to companies' mobile ambitions, most developers will agree that pushing for an entire set of tools, resources, skills and talent dedicated to mobile alone is almost unheard of in the DevOps industry ...

November 14, 2023
Zach Lloyd
Warp

A few months ago, Warp surveyed 1500+ developers about how they use the command line terminal. Specifically, the survey asked questions around common pain points, popular plugins, use of artificial intelligence, types of customizations, and perceived expertise in industry-level developers. What's the story behind the complex relationship between coder and terminal? Here is what the survey revealed ...

November 13, 2023
Stephen Atwell
Armory.io

The average developer tenure is less than two years, even for large tech companies with flashy perks. That's compared to an average employee tenure of 4.1 years across other industries. Clearly, something isn't adding up in the developer experience (DevEx). But what are non-technical leaders missing? ...

Pages

Subscribe to Vendor Forum