Vendor Forum

August 09, 2023
Richard Bird
Traceable AI

Fraud detection, typically seen as a solution outside of cybersecurity, has taken on a new dimension in recent times. Digital fraud has emerged as a significant threat to businesses and individuals alike. APIs play a pivotal role in this landscape, often serving as the gateway for fraudulent activities ... As the sophistication and frequency of digital fraud continue to rise, understanding the connection between API security and fraud has never been more critical ...

August 08, 2023
Ori Keren

What makes an engineering team elite? ... While I won't be the last to ask this question, our industry has come a long way in defining engineering excellence, providing parameters through which to define what constitutes as "elite." But what exactly should you measure to benchmark elite engineering performance? ...

August 07, 2023
Jon Mort

As an orchestration tool, Kubernetes solves many IT issues that are, unfortunately, part and parcel of using containers, including the need for high availability, reliability, scalability, fault tolerance, and spiraling costs. It's clear Kubernetes makes sense for organizations looking to manage containerized applications, but it's also a smart tool to help scale digital transformations — here's why ...

August 02, 2023
David Brooks

There has been a lot of hype lately about Platform Engineering and we have even seen a premature obituary announcing the death of DevOps. This blog looks at the two practices and finds that they are not mutually exclusive. It also shows how much of the Platform Engineering has a reduced effect in Enterprise SaaS platforms ...

August 01, 2023
Gary Archer

APIs are incredibly important in today's digital landscape. They play a crucial role in enabling communication and interaction between different software applications, systems, and services. Due to the increasing reliance on APIs, they have gradually become the top target for hackers. As such, enterprises are placing more emphasis on API security to protect the integrity of data and services, build trust and confidence, and mitigate future risks ...

July 31, 2023
Wing To

As the volume, development velocity, and variety of applications and their attack vectors skyrocket, it's time to rethink how we use application hardening. Application hardening, also known as "application shielding" and "in-app protection," protects live applications from reverse engineering and tampering ...

July 25, 2023
Ori Keren

As engineering leaders, we've all become familiar with DORA metrics ... In fact, our industry has started to view success through the lens of DORA metrics. That view is incomplete and, worse, often misunderstood. For a complete view on how to view DORA metrics and use them to improve engineering teams, we need to acknowledge some long-held misinterpretations ...

July 24, 2023
Jack McCurdy

The best tools and processes cannot produce true DevOps without a culture of collaboration and buy-in. Some organizations still fail to see the role of culture in DevOps, while others expect a mature DevOps culture to evolve overnight. Either way, this reveals a misunderstanding of what DevOps culture is and how teams can successfully create one. In what follows, we address the what and the how of DevOps culture by debunking six of the most common misconceptions ...

July 20, 2023
Dotan Nahum
Check Point Software Technologies

As a developer ... the expectation for you to maintain velocity and security only keeps growing. The "Shift Left" approach is the outcome and epitome of this accelerated pace of software development. In this instance, tests and validations are conducted early in the development cycle to arrest any risks associated with software quality. This post will unravel the opposite (and perhaps obvious) "Shift Right" concept ...

July 19, 2023
Jacob Garrison

Three crucial factors hinder the effectiveness of shifting left: test coverage, business context, and the disparity between production and pre-production environments. By critically examining and addressing these limitations, we can establish a more proactive approach to application security — ensuring that systems remain resilient by detecting vulnerabilities early on. Let's dive in ...

July 18, 2023
Rob Mason

In May, the world celebrated Global Accessibility Awareness Day (GAAD), an annual event focused on digital access and inclusion. According to GAAD's website, 98.1% of home pages have at least one Web Content Accessibility Guidelines (WCAG) 2.0 failure and approximately 60.9 average errors per home page. Applause found similar results in its Accessibility and Inclusive Design Survey ...

July 17, 2023
Keith Casey

Code generation is the art of writing programs that write other programs. The most common place to use code generation is for generating libraries ... While code generation seems simple at first, there are many sharp corners and hidden surprises in anything beyond the most trivial scenarios ...

July 12, 2023
Nimrod Vered

According to a recent Uplevel survey of over 350 software developers, there's a significant disconnect between chief technology officers (CTOs) and their teams. In fact, 30% of respondents said the majority of their problems and roadblocks go unnoticed by engineering leadership ...

July 11, 2023
Stephen Atwell

More than half of surveyed development professionals report experiencing burnout, which decreases service delivery quality and speed. In turn, slow deployment velocity and unreliable apps hurt the bottom line. Developer empowerment counteracts burnout ... Let's explore how you can elevate your software development team's performance through empowerment ...

July 10, 2023
Kristin Manogue
Check Point Software

Companies are increasingly embracing the power and agility of cloud-based solutions, with more than 20% of their workloads running in the cloud today, with plans to grow more than 50% in the next 18 months. With this accelerated cloud adoption comes inherent challenges and apprehension, as Check Point's 2023 Cloud Security Report reveals. As a result, 76% of organizations are apprehensive about cloud security, and cloud-based attacks are increasing at an alarming rate ...


Subscribe to Vendor Forum