Vendor Forum

December 02, 2024
Matias Madou
Secure Code Warrior

I've loved witnessing CISA's Secure-By-Design (SBD) movement gain momentum worldwide, as the United States, Australia, New Zealand, Canada, Singapore, Japan, Germany, and the UK commit to integrating similar guidelines and expectations into their respective cybersecurity strategies — with many of these nations also contributing to the original US recommendations.

November 25, 2024
Sean Pratt
JFrog

The escalating complexity of software supply chains and the applications being built is shifting greater security responsibilities onto developers. This shift is driving up costs and workload, threatening developer productivity and the overall quality of applications. Left unchecked, these pressures can jeopardize the very security that DevSecOps aims to enhance ...

November 21, 2024
Dotan Nahum
Check Point Software Technologies

Agile security sprints are specialized iterations within the Agile framework focused on embedding security into the sprint cycle. Rather than treating security as an afterthought or a final checkpoint, it's integrated into the regular sprint rhythm ...

November 19, 2024
TJ Dunham
ARC

The evolution of AI, particularly in cloud and serverless environments, has opened up new possibilities — but it's also introduced significant complexities, especially around privacy and data security. DevOps engineers are on the frontlines of these challenges ...

November 18, 2024
Rob Mason
Applause

Applause has released The State of Digital Quality Report ... This year's report examined more than 200,000 defects in digital experiences across enterprise software, digital banking, streaming media services, wearable devices, online retail, voice-activated devices and more. Here's what the 2024 report revealed ...

October 24, 2024
Dotan Nahum
Check Point Software Technologies

In DevOps, hierarchical security practices involve embedding security measures into every development lifecycle stage. Unlike traditional models where security is a final checkpoint before deployment, hierarchical security integrates security from the outset, beginning with the planning and design phases. By doing so, potential vulnerabilities are identified and mitigated early ...

October 21, 2024
Chris Wysopal
Veracode

The meteoric rise of artificial intelligence (AI) in the past few years has been a boon for software developers, who quickly embraced AI's ability to help them create code more quickly. But the other edge of the AI sword is that its code isn't always secure, because AI models trained on flawed code, which exists in plenty of applications, are only going to repeat the same mistakes ...

October 17, 2024
Jori Ramakers
Tricentis

We've seen AI technologies become a powerful asset for DevOps teams. Organizations are under pressure to ramp up their software delivery cycles toward faster, more efficient, releases. And those using this technology are reaping its impact. In a recent AI-augmented DevOps trends report, we found that DevOps teams leveraging AI are 30% more likely to rate their performance as either extremely or very effective ...

October 16, 2024
Cliff Malmborg
Loft Labs

The cost of running Kubernetes at scale with a large number of users quickly becomes untenable for cloud-native organizations. Monitoring costs, either via public cloud providers or with external tools such as Kubecost, is the first step to identifying important cost drivers and areas of improvement ... However, to truly reduce Kubernetes costs and simplify management in the long-term, teams should consider a new approach: multi-tenancy with virtual Kubernetes clusters ...

October 15, 2024
Anand Naik
SEQURETEK

DevSecOps emerged as a potential solution to address delays and missed vulnerabilities, streamlining development and operations by prioritizing speed and collaboration without compromising on security. But the growing complexity of cloud-native environments and the surge in the volume and vectors of the threat landscape is once more reshaping the way organizations approach software development. The latest evolution increasingly demands that security be treated as an integral part of the software development process ...

October 09, 2024
Nick Durkin
Harness

In today's high-stakes race to deliver innovative products without disruptions, the importance of feature management and experimentation has never been more clear. But what strategies are driving success, and which tools are truly moving the needle? ...

October 08, 2024
Emma Zaballos
CyCognito

CyCognito recently conducted an analysis of over 39 million data points from a diverse range of companies, providing concrete evidence validating the growing concerns about the vulnerability of our software supply chains. The report's findings reveal a troubling reality: our digital ecosystems are far more vulnerable than we'd like to believe ...

October 07, 2024
Dylan Thomas
OpenText

The incorporation of generative AI and machine learning into DevSecOps has unlocked significant potential to improve organizational efficiency in software development. Yet, despite these developments, mitigating friction between development and security teams remains a persistent challenge ...

October 03, 2024
Rob Mason
Applause

Despite steady, continued growth in the e-commerce business, limited payment options, bugs, and poor translations are still causing consumers to abandon their transactions, according to the Digital Payments and Localization Survey from Applause ...

October 01, 2024
Michael Zuercher
Prismatic

Integrations are non-negotiable for B2B SaaS companies to drive ecosystem-led growth, but without the proper development approach, they can detract from your core product by monopolizing dev resources and hampering customer experience. Success hinges on building a scalable integration strategy that grows with the ecosystem ...

Pages

Subscribe to Vendor Forum