Driving cybersecurity and digital transformation with cloud technologies

Source – csoonline.com Commercial cloud computing platforms provide a complete set of computing, security, governance and compliance services that are supported by standardized and externally certified processes and procedures. AWS has invested in obtaining several widely used accreditations such as FedRAMP, SOC-2, ISO 27001 and many more. Further, cloud service providers like Amazon Web Services (AWS) have strong management and operations processes to help protect digital assets and allow organizations to innovate. All these investments make it easier for public sector

Read more

Can DevOps help modernize legacy applications?

Source – techtarget.com The challenge with new and shiny ways to execute against DevOps-centric operational models is that they’re often devoted to applications and services built for cloud-native environments. While I certainly embrace this change and see it as the ideal strategy here on out, there’s still a rather large elephant in the room: traditional enterprise applications. Based on the ever-popular “80/20 rule” and my own experiences, most data center applications weigh the operations team down with care-and-feeding requirements. Plus, the

Read more

DORA and Google to collaborate on DevOps research

Source – appdevelopermagazine.com DevOps Research and Assessment (DORA) has announced a new research project between DORA and Google Cloud: The Accelerate State of DevOps Report. Together, DORA and Google Cloud will conduct original, in-depth research to understand what issues matter most to developers. The two companies aim to unlock new findings that will give their customers a clear path forward with guidance to improve resource management, productivity and quality of their IT teams. “Our customers migrate to the cloud to change

Read more

Nine cloud security threats you don’t want to ignore

Source – techtarget.com The following is an excerpt from The Official (ISC)2 Guide to the CCSP CBK, Second Edition, by Adam Gordon, CISSP-ISSAP, ISSMP, SSCP. This section from Domain 1 describes nine cloud security threats waiting to pounce on unsuspecting enterprises. Whether you’re managing a public, private or hybrid cloud, it’s essential for information security professionals to understand where vulnerabilities lie and how to mitigate them. Threats form a real and ever-evolving challenge for organizations to counteract and defend against. Whether they

Read more

PolarSeven Achieve AWS DevOps Competency

Source – prnewswire.com PolarSeven, Accelerate Your Cloud Automation, announced today that it has achieved Amazon Web Services (AWS) DevOps Competency status. This recognises that PolarSeven provides proven technology solutions and deep expertise helping customers: implement their continuous integration and continuous delivery practices automating infrastructure provisioning and management with configuration management tools on AWS Achieving the AWS DevOps Competency differentiates PolarSeven as an AWS Partner Network (APN) member that provides specialized demonstrated technical proficiency and proven customer success with a specific focus

Read more

How AI will influence the world of cloud-based collaboration and conferencing

Source – cloudcomputing-news.net Those who attended Cloud Expo Europe earlier this week took their opportunity to assess the next level of cloud services, ranging from blockchain, to artificial intelligence (AI) and machine learning. The cloud underpins these technologies and enables them to flourish, while as this publication has previously reported, the M&A cycle has been lit up by it. But what are some of the practical applications for cloud-enabled AI? Lifesize, a cloud-based conferencing hardware and software provider, is exploring how

Read more

How the cloud super-providers see the changing landscape

Source – cloudcomputing-news.net Earlier this week, analyst firm Cloud Spectator published its latest report on combining price and performance in the cloud. In the main, its results mirrored previous studies; that the Amazons, Microsofts and Googles of this world may not be the best option for some organisations compared with the high performance, cheaper price specialists. So what of the behemoths, and how are their strategies changing? An illuminating session at Cloud Expo Europe today, featuring IBM, OVH – who bucked

Read more

Secure DevOps: Inside the five lifecycle phases

Source – techtarget.com DevOps and cloud computing are radically changing the way organizations design, build, deploy and operate online systems. According to the latest SANS application security report, 43% of organizations are now delivering changes to production on a weekly, daily or continuous basis. With the increasing rate of change, traditional approaches to security can’t keep up. Therefore, security, IT and risk professionals are left struggling to figure out how they can reduce risk in a DevOps world. In the quest to

Read more

The future of computer security is machine vs machine

Source – csoonline.com A growing number of computer security thinkers, including myself, think that in the very near future, most computer security will be machine versus machine–good bots versus bad bots, completely automated. We are almost there now. Fortunately or unfortunately, I don’t think we’ll get to a purely automated defense for a long, long time. Today’s security defenses Much of our computer security defenses are already completely automated. Our operating systems are more securely configured out of the box, from

Read more

DevSecOps tools maturing, much to the relief of DevOps developers

Source – theserverside.com Ensuring the software an enterprise deploys is secure and ensuring that there are no software vulnerabilities in the applications an organization produces have always been an inexact science. But in this age of DevOps, more pressure than ever is being placed upon the shoulders of the typical software developer, creating a need for DevSecOps tools that will reduce the DevOps developer’s burden. Low-level, programmatic security has always been a software developer’s responsibility, but best practices have always demanded

Read more
1 2 3 23