Will Application Monitoring Bridge the Gap for DevOps?

Source- technative.io As operations, we look at a new platform/protocol/architecture/interface/tool, search a bit on Google®, and generally find that manageability challenges fall somewhere under a normal curve, or at least within the guardrails. However, new buzzword technologies including cloud, hybrid IT, containers, microservices, CI/CD, DevOps, and SDX have us facing unfamiliar territory and new requirements. While we’re not required to immediately adopt all these technologies wholesale, especially not without a blip to the general running and maintenance of IT systems, there remains

Read more

Step by step, how enterprises should embark on the journey to the cloud

Source- siliconangle.com Cloud computing has become the principal paradigm for enterprise applications. As businesses modernize their computing and networking architectures, cloud-native architectures are the principal target environments. As a result, enterprise deployment of all-encompassing cloud computing is accelerating. Many enterprises have embarked on a journey to computing in and across a multiplicity of clouds. These are the chief steps on this journey: Zero in on core cloud use cases The first step on the cloud journey is to identify the chief use

Read more

Survey: Container security is a growing concern for IT professionals

Source- fiercetelecom.com It’s not surprising that 60% of the IT security professionals in a recent survey have experienced security incidents with their container usage over the past year. But it is somewhat surprising 47% of those security professionals who manage environments with containers responded that they did deploy containers with known vulnerabilities. Maybe the promise of containers is too tempting for some IT professionals to resist. And a majority of them don’t have the same IT resources as a large telco.

Read more

PCI Council Releases New Software Framework for DevOps Era

Source- darkreading.com This week the PCI Security Standards Council released a new software security standard that is designed to help it validate the security of payment ecosystems in the face of newer software architectures and modern development methods like DevOps and continuous delivery. The new standard would ultimately replace the PCI Payment Application Data Security Standard (PA-DSS). “Software development practices have evolved over time, and the new standards address these changes with an alternative approach for assessing software security,” explains Troy

Read more

Survey Indicates Container Security Concerns Limit Adoption

Source- datacenterknowledge.com A decade ago when a cloud was the latest disruptive technology, IT departments found they needed to rewrite the book on security. The old way of doing things — protecting the perimeter of the local network or data center with firewalls and other security precautions — wasn’t enough anymore. The data center and the LAN had expanded to include VMs, applications, and data sitting outside the firewall, on cloud servers owned and operated by the likes of Amazon Web Services, Microsoft Azure, or

Read more

Can DevOps drive another record year for software M&A deals?

Source- jaxenter.com By now, ‘DevOps’ is not a new concept; it’s a word that’s on the lips of every developer and IT person (reborn now, of course, as ‘DevOps engineers’.) Yet the prophecy of DevOps has failed to fulfill itself as described in its texts. The DevOps meme continues to mutate. Meanwhile, the ground itself is beginning to shake with the footsteps of giants like Atlassian, Github/Microsoft, Cisco, IBM, VMware and more. It seems that the real tectonic shift is yet

Read more

How AIOps Helps You Get More Out of DevOps

Source- devops.com DevOps may seem like an overused term. It involves taking an application’s source code and running it in an environment. It can cover the processes, the technology or even the people that maintain the technology that is running those very processes. At its heart, though, DevOps is about helping developers to be self-sufficient when it comes to the basic operations around getting their application to a real environment. Once things are running in a test or production environment, there

Read more

Security scanning is available now in SonarQube and SonarCloud

Security scanning is available now in SonarQube and SonarCloud for PHP, C#, T-SQL, VB.NET, Java and Swift   Why Do We Care About Application Security? With all the threats lurking out in the wild, application security remains a top-of-mind subject. In spite of these concerns, the number of security breaches continues to rise along with the number compromised accounts containing user data. Why is this happening even with all the emphasis on better security? The simple answer is that it’s not

Read more

9 Pillars of Continuous Security Best Practices

Source- devops.com Without proper consideration given to security best practices, the continuous delivery of software changes facilitated by DevOps is risky. On the other hand, DevOps provides an opportunity to reduce security risks if security is integrated into the continuous delivery pipeline according to best practices. This blog enumerates best practices for security across nine pillars of DevOps: Leadership, Collaborative Culture, Design for DevOps, Continuous Integration, Continuous Testing, Continuous Monitoring, Elastic Infrastructure, Continuous Delivery/Deployment and Continuous Security. Examples of best practices

Read more

With 2019 on its way, what new tech trends are on the horizon?

Source- jaxenter.com As we bid adieu to 2018 and welcome in 2019, it’s only natural to wonder what kind of progress we’ll see and what new advancements will soon be at our fingertips. In the past few years the development of tools and techniques around DevOps have seen changes that outpace what most organisations can keep up with, but the impact of these changes can be felt for years. This fast pace of change is unlikely to slow any time soon,

Read more
1 2 3 4 5 139